繁體版 English Francais한국어Русскийไทย
登录 注册

否认性

"否认性"的翻译和解释

例句与用法

  • The information security connotation has been extending continually , from confidentiality to integrality , usability , controllability and non - repudiation , then to attack , defense , detection , management and evaluation . on the other hand , with computer and network technology developing , the intrusion and attack happen continually
    信息安全的内涵在不断地延伸,从最初的信息保密性发展到信息的完整性、可用性、可控性和不可否认性,进而又发展为攻击、防范、检测、管理、评估等多方面的基础理论和实施技术。
  • For the above reason , new security mechanism for wlan is necessary to make sure the data in transmission confidential , complete and undeniable . at the same time , it should provide identity certification and access control . the 802 . 1x fulfils all the above requirements , which provides an upgraded certification and authentication method for controlling lan users ’ access through port - based certification
    然而常规的无线局域网安全措施如wep等都已被证明不再安全,人们已经认识到必须专门为wlan设计新的安全防护机制,以保护在wlan中传输数据的机密性、完整性和不可否认性,同时对请求接入wlan的用户进行身份认证和访问控制。
  • It uses xml encryption , xml signature and ssl technology to design and implement the solution of transmission of tender and evaluation documents separately which are based on the different security requirement . the solutions guarantees the secrecy , incontestability , integrity and identity authentication in the transmission of the bidding documents
    在标书传递子系统中根据不同的安全需求,使用xml加密、 xml签名和ssl技术分别为投标书和评标书设计并实现了安全传递的方案,确保了标书传递中的保密性、完整性、长期不可否认性、时间有效性和用户身份正确性。
  • And then introduces the concepts of soap and the influence which soap message security impact on web services message security . in succession , put forward the specifications concerned with web services message security , such as ws - security xkms saml . according to those specifications , design a secure model of soap message which can ensure the confidentiality integrity
    然后对soap概念及其安全对web服务消息安全的影响做了介绍,接着重点介绍了目前与消息安全有关的几个规范,如ws - security 、 xkms 、 saml等,在这些规范基础上,设计了一消息安全模型,该模型基本能保证soap消息的机密性、完整性、验证、不可否认性及授权,能保护web服务的安全。
  • Finally , takeing example for the electronics official document flow in army ' s office automation , we gave the study , design and implementation on the encryption and digital signature of official document , by which the problem of confidentiality , reliability , integrity and non - repudiation etc were well solved , thus the securiy in the aoas was improved obviously
    并以军队办公自动化中的电子公文流转为实例,对公文加密和数字签名进行了研究、设计和实现,较好地解决了军队电子公文在流转过程中存在的保密性、真实性、完整性和不可否认性等问题,提高了军队办公自动化的信息安全能力。
  • Especially , the computer ' s automatic making up examination paper is the most difficult point in the design of the question base management system , is solved by establishing the question selecting model , which is based on the least square algorithm . this model also simplifies the programming and ensures the consistency and adaptability of the question selecting under the same choosing request
    最后,对系统开发过程中涉及到自动组卷、数据压缩、客户端数据库和考生答案不可否认性的技术进行深入研究,特别是试题库管理系统设计中的难点计算机自动组卷问题,通过建立选题数学模型并将最小二乘理论引入选题策略,不仅简化了编程,而且保证了同一选题要求下选题的一致性。
  • Then , a model is constructed that synthesizes kinds of secure transmission technology . during the whole process of information communication , the model implements the encrytion , decryption , signature , authentication , and ensures confidentiality , integrity , authentication and non - repudiation
    在数据传输过程中,通过身份认证,安全连接的建立,利用dsa 、 aes和md5等加密算法对数据的处理和传输,实现了加解密、签名、认证等功能,保障了数据机密性、完整性、真实性和实现用户行为的不可否认性
  • Based on the realization and study of pkt / pmi theory , this paper introduces the security strategy and technology grounded on the pki to the e - govcrnment applications . it satisfies the information security requirements of confidentiality , integrality and ineontestability of the e - government development . from the point of view , of adapting the applications , this paper proposes the hierarchical system of setting up the secure e - government
    本文在对公钥基础设施pki pmi的理论、实现和应用研究的基础上,将基于公钥基础设施的安全策略和技术引入到电子政务的应用中,通过pki pmi的信任和授权服务技术来解决电子政务发展对信息安全的机密性、完整性以及不可否认性的要求。
  • A new security problem comes out when policy communication mechanism appears in such embedded firewall environment , namely how to assure the security during the distribution of policy which lead to veracity of policy enforcement in embedded firewall , like how to ensure the authenticity of applicants and the server and avoid senders to deny their services for the users within the policy communication between policy server and client nics , and how to achieve the confidentiality and integrity of the policy during the process
    安全访问策略的分发过程是否安全直接影响嵌入式系统的访问控制实施的准确性,其中包括如何保证策略交互通信中申请者及发送者身份的真实性以及操作的不可否认性,如何实现策略传输的机密性,完整性。由此,本文需要解决如何集中定制安全访问策略规则,以及有效实施安全策略交互。
  • In a wireless mobile communication system , mutual authentication and key establishing protocols not only need to establish a shared key for encrypt information exchange in conversation on the basis of mutual authentication , but they also need to satisfy essential security requirements , including forward secrecy , impersonated attack and man - in - middle attack , etc
    摘要在无线通信系统中,相互认证和密钥建立协议不仅要在实现实体间的相互认证的基础上建立唯一的共享会话密钥,而且协议本身还应当满足一定的安全要求,如防止假冒攻击、服务的不可否认性等。
  • 更多例句:  1  2  3  4  5
用"否认性"造句  
英语→汉语 汉语→英语