英语人>网络例句>confidentiality 相关的网络例句
confidentiality相关的网络例句

查询词典 confidentiality

与 confidentiality 相关的网络例句 [注:此内容来源于网络,仅供参考]

I developed IC card inductive charging parking computer management system is currently the world's most advanced computer management system for charging one with fast and convenient, accurate and reliable charging, confidentiality, and high sensitivity, long life, the form of a flexible, powerful, and many other advantages, has become the mainstream of a new generation of parking.

我公司研制的感应式IC卡停车场电脑收费管理系统是目前国际上最先进的电脑收费管理系统之一,具有方便快捷,收费准确可靠,保密性好,灵敏度高,使用寿命长,形式灵活,功能强大等众多优点,已成为新一代停车场的主流。

In the absence of injunctive remedies confidentiality provisions are of doubtful effect.

在缺乏禁令救济的情形下,保密条款的作用令人怀疑。

To protect the athletes' confidentiality , he said, the results of those tests have yet to be officially confirmed, but they are thought to show that Miss Semanya has what's called an intersex condition that would prevent her competing in women's events.

为了保护运动员的隐私,他说,测试的结果还没有正式承认。但是检查结果显示塞门亚是通常所称的"阴阳人",这种状况被禁止参加女子比赛。

Article 17 The bank shall use proper encryption technology and measures, so as to identify users of the online banking services and the authorization thereof, ensure the confidentiality and authenticity of the data transmitted in online transactions, and accomplish the integrity of information transmitted on line and the irrevocability of the transactions.

第十七条银行应采用合适的加密技术和措施,以确认网上银行业务用户身份和授权,保证网上交易数据传输的保密性、真实性,保证通过网络传输信息的完整性和交易的不可否认性。

Compared with traditional KEM scheme, Signcryption KEM can provide both confidentiality security and unforgeability security for session key.

该方法可以使密钥封装同时具有保密安全性和不可伪造安全性。

Hybrid schemes in a KEM-DEM structure is regarded as the most natural approach to public key encryption with IND-CCA security and practical efficiency. Traditional KEM is realized by public key scheme, which only provides confidentiality security for session key used by DEM. In 2005, combining the idea of signcryption with the KEM-DEM model hybrid encryption, Alexander proposed a signcryption KEM-DEM model hybrid signcryption primitive.

KEM-DEM结构的混合密码体制是获得IND-CCA安全最实际有效的方法,传统的KEM由公钥加密方案实现,仅提供DEM使用的会话密钥的保密性安全。2005年Alexander等人将签密的概念与KEM-DEM结构的混合密码体制相结合,提出了Signcryption KEM-DEM结构的混合签密。

This is important because liquidated damages were the most important means of giving practical effect to confidentiality provisions.

这一点很重要,因为违约金是使保密条款有实际作用的最重要的手段。

In his ruling Igor Judge, the Lord Chief Justice, held that the principle of confidentiality between intelligence agencies was "not absolute".

首席大法官,伊格尔法官认为情报局之间的保密规则是不确定的。

The obligations of confidentiality, nondisclosure and nonuse shall survive for a period of three years from the date of this Agreement.

自本协议签署之日起三年之内,协议双方须承担本协议的保密、不披露和不使用责任。

However, the obligations of confidentiality, limited use and nondisclosure hereunder with respect to the Business Relationship and any Confidential Information shall continue until such time that the information disclosed no longer constitutes Confidential Information under Section 2 of this Agreement, and such obligations shall survive any termination of this Agreement.

然而, 机密的义务,有限使用和未公开以下有关于商务关系和任何的机密数据将继续到如此的时间数据揭露不再组成在这协议的第 2 节下面的机密的数据,和如此的义务将幸存任何的这协议的终止。

第8/15页 首页 < ... 4 5 6 7 8 9 10 11 12 ... > 尾页
推荐网络例句

With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.

随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。

But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.

不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。

Closes the eye, the deep breathing, all no longer are the dreams as if......

关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。