用户信息
- 与 用户信息 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Contravening the basic principles of the Constitution of the People's Republic of China
第十七条外国机构在中国境内向用户提供的金融信息,不得含有下列内容:违反中华人民共和国宪法基本原则的
-
User Conduct - You agree that you will not upload, post, submit or send any Content to ICQ in order to distribute, facilitate distribution, or directly link to any content that:(1)is offensive, vulgar, sexually explicit, racial, hateful, discriminating, unlawful, invasive of another's privacy, exploitation of a minor, identifiable information of a minor, information or instructions concerning illegal activities, information that is harmful, violent, threatening, abusive, harassing, defamatory, libelous, tortuous, obscene, or otherwise objectionable;(2) harasses, threatens, abuses, defames, degrades, embarrasses or causes distress or discomfort upon another;(3) solicits for exchange, sale or purchase of sexually explicit images, and/or material harmful to minors; including, but not limited to, any photograph, film, video, or picture or computer generated image or picture.
用户行为--你同意你不会上传,邮派任何提交或ICQ的内容为散发,以便分配或直接连接任何内容 1进攻,粗俗,色情、种族仇恨,歧视,非法、另创的隐私,剥削未成年识别资料未成年指示有关资料或违法活动,这是有害的信息,暴力、威胁、侮辱、骚扰、诽谤、污蔑、曲折、色情或其他不良;骚扰、威胁、虐待、丑化、贬低,造成困扰或尴尬或不适经另;索贿交流、买卖性爱的图象和/或有害物质的未成年人;包括但不限于任何照片、电影、录像、照片或图画或形象或计算机生成。
-
This dissertation uses the double-encrypting method based on the public key technology to protect the agent from being eavesdropped, providing a feasible measure to detect counterfeit codes in the host to ensure the security of the agent in the process of transmission.
本文利用公钥加密手段,采用双重加密方法阻止恶意用户对主体信息的窃取,提供一种识别假冒代码的手段保障主体在传输过程中的安全。
-
In the thesis, the PKI end system realizes application security and variety by encapsuling SSL protocol into application layer and offering the application interface in it directly.
同时,安全中间层着眼于本地信息安全,对文件存在状态做全局性管理,并依据中间件实现原理,设计了网络传输发送和接收的安全代理功能,并支持对网络数据的统一调配,同时还研究了算法的相对安全性和用户的加密算法接口。
-
To sign a message, a user encrypts the message using his or her private key.
签署一项讯息,一个用户加密的信息,用他或她的私人钥匙。
-
In part of the AAA, the application of information encrypts and authentication about users identity can resolve the above problem.
在数据的网络传输部分,本文采用AAA机制,进行了信息加密、用户身份认证等安全措施的应用,加密算法采用了国际流行的DES标准。
-
If Firefox 2.0 is used to visit the site, a message appears: 'this page has already been reported for maliciously entrapping users into revealing personal or financial information.
用Firefix 2.0访问该网站,会提示:此页面已经被汇报为蓄意伪造为诱骗用户透露个人或金融信息的页面。
-
Texts that are displayed to the user should be externalized into a separate resource file, thus separating messages from the actual code.
文本的显示给用户应该到一个单独的资源文件中具体化,从而脱离实际的代码信息。
-
Federated digital library should enable heterogeneous data sources to be shared and allow users to access them easily.
联合数字图书馆的目的就是为了实现信息的集成共享,给用户提供统一资源查询服务。
-
Meanwhile, cornbinethe construction of the interior management information system of the government and feeing customer service system, integrate consideration and plan.
利用信息化强化政府的管理职能和改进国家的治理,与此同时,将政府内部的管理信息系统的建设与面向用户的服务系统的建设结合起来,综合加以考虑和规划,充分利用自己的后发优势,争取实现跨越时空的发展。
- 推荐网络例句
-
According to the clear water experiment, aeration performance of the new equipment is good with high total oxygen transfer coefficient and oxygen utilization ratio.
曝气设备的动力效率在叶轮转速为120rpm~150rpm时取得最大值,此时氧利用率和充氧能力也具有较高值。
-
The environmental stability of that world - including its crushing pressures and icy darkness - means that some of its most famous inhabitants have survived for eons as evolutionary throwbacks, their bodies undergoing little change.
稳定的海底环境─包括能把人压扁的压力和冰冷的黑暗─意谓海底某些最知名的栖居生物已以演化返祖的样态活了万世,形体几无变化。
-
When I was in school, the rabbi explained everythingin the Bible two different ways.
当我上学的时候,老师解释《圣经》用两种不同的方法。