查询词典 security exchange
- 与 security exchange 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
SIADR has also undertaken the intelligent design, compilation of specifications and construction guidance for the projects of Shanghai Jin Mao Building, Shanghai Security Exchange Building, Shanghai Futures Building, Shanghai Information Building, Bank of China Building, Citigroup Tower, Pudong Development Bank, etc.
本公司承担了上海金茂大厦、上海证券大厦、上海期货大厦、上海信息枢纽大楼、中银大厦、花旗集团大厦、浦发银行等众多著名智能建筑的智能化设计、技术标书编制和施工指导工作。
-
It has successfully accomplished quite a few excellent designs of those landmark projects known as Shanghai Stadium, Shanghai Library, Shanghai Museum, Shanghai Science Land, Jin Mao Building, Shanghai Pudong International Financial Building, Shanghai Security Exchange Building, Shanghai Children's Medical Center, Ward Building of Huashan Hospital, First Aid Center of Chang Zheng Hospital, Shanghai Jiao Tong University, Min Hang Branch.
创作出了一大批以上海体育场、上海图书馆、上海博物馆、上海科技馆、金茂大厦、浦东国际金融大厦、上海证券大厦、上海儿童医疗中心、华山医院病房大楼、长征医院急救中心、上海交通大学闵行分部等代表性优秀建筑作品。
-
Internet protocol security ; key exchange ; Internet key exchange protocol ; provably secure ; universally composable
Internet协议安全;密钥交换; Internet密钥交换协议;可证安全;通用可组合
-
Therefore, in order to enhance the regulation of the offeror and the management of target company, to protect the benefits of the shareholders of target company, and to maintain the standard of the security exchange system, not only should the legislative establish the two basic principles of information transparency and equal treatment of target company"s shareholders, but also establish the supplementary principles of the protection of middle and small shareholders" benefits, of the forbiddance of underground transaction, of caution offer, and of anti-offer abuse.
因此,除充分披露和目标公司股东平等待遇两项基本原则外,笔者认为,要约收购还应受保护中小股东利益、要约谨慎、禁止内幕交易及阻挠不得滥用原则的规制,以加强对收购者和目标公司管理部门的规范,保护目标公司股东的利益,维护证券市场的正常秩序。英美两国在要约收购规制方面的规范较为完善,也做得比较成功,并具有一定的代表性。
-
TheAdvancestoIP Multimedia Subsystem architecture, built on the 3rd Generation Partnership Project 2 (3GPP2)'s Multimedia Domain, supports both IMS/MMD and non-Session Initiation Protocol services. In terms of network operation, A-IMS as extensions to IMS/MMD enhances the IMS/MMD network security with the addition of Security Operation Center, posture agent, etc. Some parts of the A-IMS framework are still under development sUCh as terminal support for the posture agent, security information exchange, and security policy definition.
改进的IP多媒体子系统基于3GPP2的多媒体域架构,包含了所有IP多媒体子系统/多媒体域业务功能,并增加了对非会话发起协议应用的支持;从网络运营的角度,针对IMS/MMD网络安全提出了一些扩展和补充,如增加了安全操作中心和姿态代理等,使IMS/MMD网络的安全性得到了较大改进。A-IMS仍处于框架性描述阶段,还有很多细节尚不明确,如终端对姿态代理的支持能力、安全信息交换的内容、安全策略的具体定义等,有待于进一步研究。
-
Next, I made detailed description of a general online security broker's business, on the basis of investigation on an online security exchange broker—company A, its organization structure, source of income, its competitive superior and weakness.
接下来便以 A 证券网为例,详细介绍了该公司的业务及组织情况,A 公司的收入来源分析,以及该公司所具有的优势与劣势。
-
The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.
在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。
-
Security" means any note, stock, treasury stock, security future, bond, debenture, evidence of indebtedness, certificate of interest or participation in any profit-sharing agreement, collateral-trust certificate, preorganization certificate or subscription, transferable share, investment contract, voting-trust certificate, certificate of deposit for a security, fractional undivided interest in oil, gas, or other mineral rights, any put, call, straddle, option, or privilege on any security (including a certificate of deposit) or on any group or index of securities (including any interest therein or based on the value thereof), or any put, call, straddle, option, or privilege entered into on a national securities exchange relating to foreign currency, or, in general, any interest or instrument commonly known as a "security, or any certificate of interest or participation in, temporary or interim certificate for, receipt for, guarantee of, or warrant or right to subscribe to or purchase, any of the foregoing.
参见笔者文章,《美国&公司&的主要经营组织形式及法律特征分析》,&corporation&与&Company&在我国虽然都被翻译为&公司&,但它们在英文中却是两个完全不同的概念。
-
The main features of this paper is: nothing to do with the platform, this system can be compatible with the majority of software and hardware used by the platform, as well as various database platform, shielding the differences of hardware and software platform such as network, operating systems, databases, application systems and so on, so that enterprises and institutions could achieve seamless, transparent data exchange through data exchange system; Java technology used to develop the system transplantability; using data exchange center to achieve centralized data processing, different data format conversion, increased system scalability; from data transmission, authentication, access control, encryption and more news content log-class areas enhanced data exchange system security; using DES and RSA algorithm , increased the confidentiality of data transmission; create WrapperTimer category achieved data transmission timing implementation and reduce the dependence on artificial.
设计的系统与平台无关,能兼容企业所用的大多数软硬件平台,以及各种数据库平台,屏蔽网络、操作系统、数据库、应用系统等软硬平台的差异,使企事业单位通过数据交换系统实现无缝的、透明的交换数据;采用数据交换中心来实现数据的集中处理、不同数据格式的转换,增加了系统的可扩展性;从数据传输、身份认证、权限控制、消息内容加密和多级日志等多方面增强数据交换系统的安全性;用DES和RSA算法对XML文件或XML文件中的元素进行加密,增加传输数据的保密性;创建WrapperTimer类实现了数据传输的定时执行,降低了对人工的依赖性。
-
The thesis begins with the current situation of foreign trade of Guangdong Province and the development status of foreign exchange business of CCB Guangdong Branch. Then the author reviews theoretical accomplishments of credit financing over the past 30 years, mainly involving credit transaction cost security theory, adverse selection and moral risk security theory, and relationship lending security theory. So CCB should open-mindedly reassess the scope and controllability of mortgage security and increase the importance of cash flow to repayment.
本文首先介绍了广东省对外贸易进出口状况及建行广东省分行的外汇发展状况,回顾了信贷融资理论近三十年的发展成果,主要涉及信贷交易成本担保理论,逆向选择与道德风险担保理论和关系贷款担保理论,指出省建行必须重新认识抵押担保的范围和可操控性,强化现金流对还款的重要性。
- 推荐网络例句
-
The absorption and distribution of chromium were studied in ryeusing nutrient culture technique and pot experiment.
采用不同浓度K2CrO4(0,0.4,0.8和1.2 mmol/L)的Hoagland营养液处理黑麦幼苗,测定铬在黑麦体内的亚细胞分布、铬化学形态及不同部位的积累。
-
By analyzing theory foundation of mathematical morphology in the digital image processing, researching morphology arithmetic of the binary Image, discussing two basic forms for the least structure element: dilation and erosion.
通过分析数学形态学在图像中的理论基础,研究二值图像的形态分析算法,探讨最小结构元素的两种基本形态:膨胀和腐蚀;分析了数学形态学复杂算法的基本原理,把数学形态学的部分并行处理理念引入到家实际应用中。
-
Have a good policy environment, real estate, secondary and tertiary markets can develop more rapidly and improved.
有一个良好的政策环境,房地产,二级和三级市场的发展更加迅速改善。