助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   信息泄露 的翻译结果: 查询用时:0.054秒
图标索引 在分类学科中查询
所有学科
互联网技术
投资
金融
证券
无线电电子学
电信技术
数学
宏观经济管理与可持续发展
更多类别查询

图标索引 历史查询
 

信息泄露     
相关语句
  information leakage
     How to Make a Project Decision on the Conditions of Information Leakage and Moral Hazard
     信息泄露、道德风险对项目决策影响分析
短句来源
     The Application of Information Leakage Defendable Model in Enterprise Intranet Security
     信息泄露防御模型在企业内网安全中的应用
短句来源
     This manifests information leakage and suggests an informal information environment in A-share market.
     这种价格无明显变化而交易量存在较大变化充分说明,在分红事件公告之前我国A股市场已存在内幕信息泄露,并且一部分人利用内幕信息来交易股票。
短句来源
     The algorithm was improved to obtain the best solution to sensitive information leakage quickly.
     改进了算法,可快速获得解决敏感信息泄露的最佳方案;
短句来源
     As a result of seeking project information,it can lead to project information leakage and reduce the value of the project while evading the uncertainty of the project and increasing the value of the project.
     搜集信息一方面可以引起项目信息泄露,从而导致项目价值下降,另一方面可以规避项目不确定性,项目价值得到相应提升。
短句来源
  information leaking
     AN ANTI INFORMATION LEAKING SYSTEM DESIGNING AND IMPLEMENT THAT BASED PATTERN MATCHING INTRUSION DETEETION TECHNOLOGY
     一个基于模式匹配入侵检测技术的防信息泄露系统的设计与实现
短句来源
     A detailed analysis is made of the approaches of computer defence,such as defence countermeasure of computer virus, defence countermeasure of computer hacker, security and protection against computer information leaking, defence countermeasure of communication reconnaissance and interference, defence countermeasure of intervention browse.
     其中重点论述的计算机防御的途径,包括计算机病毒的防御对策、计算机黑客的防御对策、计算机信息泄露的安全防护、通信侦察与干扰的防御对策及介入浏览的防御对策。
     But this method has the shortcoming of information leaking.
     但是该方法存在信息泄露等问题。
短句来源
     In our improved scheme, in combination with the specialties of One-Time Password, the elliptic curve cryptographic algorithms was used to encrypt the challenging information in communication and the saving information in the server, to prevent information leaking.
     在改进方案中,根据一次性口令认证的特点,利用椭圆曲线密码算法对通信时的挑战信息进行加密,同时对服务器端保存的信息也采用公钥加密后保存的形式,以防止信息泄露
短句来源
     The security problem is more important to wireless WLAN than that to wired networks,for wireless networks transfer information with electromagnetic wave which may lead to information leaking and being eavesdropped.
     与有线网络相比,无线局域网采用电磁波作为载体进行信息传输,存在着信息泄露及被窃听的安全隐患,因此其安全问题显得尤为重要。
短句来源
更多       
  information leak
     The functional requirements of a secure OS are mapped into a secure MMS in accordance with Trusted Computer System Evaluation Criteria. Process isolation,prevention of memory information leak,memory access control and virtual memory protection as four function requirements of secure MMS are first presented.
     依据可信计算机系统评估标准,将安全OS的功能需求依次映射到内存管理子系统,初步提出安全内存管理子系统的四个功能:进程隔离、防止内存信息泄露、内存访问控制,虚拟内存保护;
短句来源
  information revelation
     The former network security product main prevented comes from outside the network attack behavior, has been helpless regarding in net secret information revelation tradition network security equipment, the waterbox took one kind of new in net security product is prevents the secret information revelation one kind of important tool, this article main introduction waterbox principle and the concrete use.
     以往的网络安全产品主要的防止来自于网络外部的攻击行为,对于内网的机密信息的泄露传统网络安全设备就无能为力了,防水墙作为一种新的内网安全产品是防止机密信息泄露的一种重要工具,本文主要介绍防水墙的原理及具体用途。
短句来源

 

查询“信息泄露”译词为其他词的双语例句

     

    查询“信息泄露”译词为用户自定义的双语例句

        我想查看译文中含有:的双语例句
    例句
    为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
      information leakage
    It involves very simple CHC operations and reduces the information leakage to a negligible small level.
          
    But the original user may be under the risk of information leakage and identity abused for sending his credential to remote computing environment.
          
    Withholding calls (information suppression) and producing calls (information leakage) thus each appeared functionally manipulative, their usage depending only on whether they benefited the signaler.
          
    Such equilibria are limits of a sequence of (subgame perfect) Nash equilibria in perturbed games where with small probability information about the strategic behavior is revealed to other players (information leakage).
          
    For wavelet regression, the non-uniformity of the wavelet components, the multiscale nature of the signal, and the prevention of information leakage are crucial issues that will be addressed.
          
    更多          
      information leaking
    People should develop habits that help reduce the amount of information leaking from their organization.
          
    To prevent information leaking, IdP blinds the assertion as follows.
          
      release of information
    We study the effects of the public release of information (polls) on participation levels.
          
    This paper discusses historical background, regulatory oversight, ethical implications and release of information as it pertains to research conducted by the US Military.
          
    In this paper we consider possible inferences an intruder can make about confidential categorical data following the release of information on one or more association rules.
          
    The vignettes addressed issues such as consent, boundaries of competency, accommodation, and release of information.
          
    Any missed term or title will result in no release of information.
          
    更多          
      information leak
    As a forensic mechanism to deter information leak and to trace traitors, digital fingerprint must be difficult to remove.
          
    In this section, we study the information leak of our algorithm.
          
    So, we would like k to be large to avoid any information leak due to our model.
          
    Such information leak should be avoided and only recoverable SOAP faults should be presented to consumer in run-time deployments.
          
      其他


    The inquiries are made into the generation of unsafe factors and various corresponding protective measures against disclosing of information in local areas of the microprocessor network and data being destroyed, and lowering down of the network safety.

    针对当前一些微机局域网中有关信息的泄露,数据遭到破坏而引起网络安全性能下降这一点,从网络内不安全因素的产生和相应的各种防护措施这两个方面做一些探讨。

    It is generally believed that the discrete logarithm problem in a non-supersingular elliptic curve E/K is much more difficult than the discrete logarithm problem in a finite flied of the same size as K. So, the elliptic curve cryptosystems can provide equivalent security as the existing public key schemes, using muchshorter secret keys. This is a very interesting property. To find a suitable elliptic curve is a basic step to build an elliptic curve cryptosystem. Schoof's algorithm is an interesting method to...

    It is generally believed that the discrete logarithm problem in a non-supersingular elliptic curve E/K is much more difficult than the discrete logarithm problem in a finite flied of the same size as K. So, the elliptic curve cryptosystems can provide equivalent security as the existing public key schemes, using muchshorter secret keys. This is a very interesting property. To find a suitable elliptic curve is a basic step to build an elliptic curve cryptosystem. Schoof's algorithm is an interesting method to find a suitable curve, but it and its various improvements are not efficient enough so far. This paper presents a method to construct an elliptic curve E over the prime field Zp whose order # E(Zp) contains two large prime factors and has no smooth factors. The time complexity of the method is O(log32p).This kind of elliptic curves can be used to various situations in which composite order groups are needed. In the cryptosystems over such elliptic curves, the leakage of information is prevented. and then the cryptosystems are robust against the attacks in Anderson's paper. This paper also improves the existing methods of building an elliptic curve E/Z, with nearly prime order. Comparing with former ones, it shows that the authors' method is more efficient.

    本文提出了一种素域Zp(p>3)上椭圆曲线的构造方法,以获得椭圆曲线E/Zp,使得E(Zp)无平滑阶子群且其阶#E(Zp)中含有多个大素因子.这类椭圆曲线可用于密码技术中各种需要合数阶群的情形.在这类椭圆曲线上建立密码体制,消除了离散对数型保密或数字签名方案信息泄露的隐患,为建立可抗击各种攻击的椭圆曲线密码体制提供了基础.同时,本文还对现存的用于密码体制的椭圆曲线构造方法(这些方法用于构造#E(Zp)中只含一个大素因子的椭圆曲线)进行了改进,使之更加有效且便于实现.

    This days business depends on E-mail , but E-mail systems can't depend on any protection. Wrong eyes got look at sensitive information , virus and sp am flooding in Internet are capital problems of unguarded E-mail. How can we do ? This paper bring forward corresponding solution—encryption and digital s ignature, virus scanning and E-mail content filtering—discussing related method and technology, pointing out their shortcoming and growing trend. Finally, anal yze why secure E-mail systems aren't popularization...

    This days business depends on E-mail , but E-mail systems can't depend on any protection. Wrong eyes got look at sensitive information , virus and sp am flooding in Internet are capital problems of unguarded E-mail. How can we do ? This paper bring forward corresponding solution—encryption and digital s ignature, virus scanning and E-mail content filtering—discussing related method and technology, pointing out their shortcoming and growing trend. Finally, anal yze why secure E-mail systems aren't popularization , what is information unit s should do.

    针对电子邮件带来的主要安全问题 :敏感信息泄露 ,病毒传播以及垃圾邮件泛滥提出相应的三种解决方法和相关技术 :加密和数字认证 ,病毒查找和邮件过滤。本文对这三种技术进行了全面论述 ,指出它们存在的问题以及发展方向。最后对安全电子邮件为何难以全面普及作了客观全面的分析 ,并指出情报部门应该采取的安全措施

     
    << 更多相关文摘    
    图标索引 相关查询

     


     
    CNKI小工具
    在英文学术搜索中查有关信息泄露的内容
    在知识搜索中查有关信息泄露的内容
    在数字搜索中查有关信息泄露的内容
    在概念知识元中查有关信息泄露的内容
    在学术趋势中查有关信息泄露的内容
     
     

    CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
    版权图标  2008 CNKI-中国知网
    京ICP证040431号 互联网出版许可证 新出网证(京)字008号
    北京市公安局海淀分局 备案号:110 1081725
    版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社