助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   legal users 的翻译结果: 查询用时:0.009秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

legal users
相关语句
  合法用户
     The aim is to extend services of library electronic resources,to facilitate the access of legal users and to improve the usage factor of these resources.
     旨在更好地延伸图书馆电子资源的服务空间,方便合法用户的使用,提高图书馆电子资源的利用率.
短句来源
     The security of MSR+DH scheme in [1] is analysed thoroughly, which is found to be insecure against the active attack of the operators in the base station to impersonate the legal users.
     本文详细分析了文献[1]中MSR+DH方案的安全性,指出了该方案的不安全性:无法防止基地站的操作人员假冒合法用户进行的主动攻击。
短句来源
     Authentication mechanism is to provide security protection for legal users.
     认证机制是为合法用户提供安全保障。
短句来源
     On the basis of analyzing the principles and functions of the agent server and the reverse agent server, to meet the needs of the application in the campus network of colleges and universities,this article puts forward an applicable plan to enable legal users of networks outside of the campus to visit and use the campus network resources by employing the reverse agent server.
     文章在分析代理服务器、反向代理服务器的原理和功能的基础上,根据高校校园网络应用需要,提出利用反向代理服务器解决外网合法用户访问校园网络资源的应用方案。
短句来源
     An intrusion detection system(IDS) can detect system or network sources in a real time way,find the intruder in time,and prevent legal users' misoperation.
     入侵检测系统 (IDS)可以对系统或网络资源进行实时检测 ,及时发现闯入系统或网络的入侵者 ,也可预防合法用户对资源的误操作 ;
短句来源
更多       
  “legal users”译为未确定词的双语例句
     Therefore, the problem of safe and privacy has become obvious. It becomes one of essential demand to protect identification of legal users in some applications such as E-Voting, E-Banking, and E-Commerce.
     其中的安全与隐私问题也越来越突出,在一些应用如电子投票(E-Voting)、电子银行(E-Banking)、电子商务(E-Commerce)中,保护用户的隐私信息己成为一种基本需求,因此兴起了匿名通信的研究。
短句来源
     ②About rights control, the system uses a new method of structure, distribution and authentication of the licence key, which prevent nonlicet and legal users from getting the licence key.
     ②在版权控制上,该系统采用一种新的内容许可证密钥构造、分配和认证的方法,使机器指纹、用户个人信息和内容许可证绑定,从而保证不管非法用户还是授权用户都无法获知该内容许可证密钥。
短句来源
     Data analyzing module uses IP-MAC, IP-PORT or IP-MAC-PORT management methods to analyze the collected data, finds out IP address embezzlement users and locates their sites, according to the legal users' information stored in User Management Database.
     数据分析模块根据用户管理信息库中的合法用户信息,按IP—MAC、IP—PORT或IP—MAC—PORT管理方案对采集到的数据进行分析,查找出进行IP盗用的用户,并追踪定位出其具体位置;
短句来源
     This thesis researches a method of IPv6 address auto-configuration based on authentication. It adds authentication mechanism to IPv6 stateless address autoconfiguration, which only allows the legal users to obtain IPv6 address and to access IPv6 network. Consequently, it can guarantee the network security from the beginning.
     本论文研究了一种基于认证的IPv6地址自动配置方法,在IPv6无状态地址自动配置过程中加入认证机制,只有经过授权的节点才能获得IPv6地址,从而接入IPv6网络,从源头上保证了接入网络的安全性。
短句来源
     The Distributed Denial of Services (DDoS) Attack is a serious issue on current Internet, and frustrates legal users to use some resources they needed.
     分布式拒绝服务(DDoS)攻击是当前影响因特网正常工作的一个严重的问题,出现的攻击将会阻止合法的用户使用其所需要的资源。
短句来源
更多       
  相似匹配句对
     Reflection on Library Users' Legal Right
     读者权利的法哲学思考
短句来源
     On the Legal Responsibility of Computer Software End-users
     论计算机软件最终用户的法律责任
短句来源
     On Legal Provisions
     论法律规范的若干问题
短句来源
     On Legal Transaction
     法律交易论
短句来源
     For users simple operation;
     对于用户操作简单;
短句来源
查询“legal users”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  legal users
In this scheme, effective digital signature can not be generated by anyk-1 or fewer legal users, or only by signature executive.
      
A network application is developed, which allows legal users to exchange messages protected by the proposed method.
      
Water acquisitions and transfers must not inhibit the ability of other legal users of water to use the water to which they have rights.
      
Not only can server verify the legal users, but users can verify the legal server.
      
A corollary of this is that a watermarking method must rst of all be robust against those transformations used by legal users of the image.
      


The security of MSR+DH scheme in [1] is analysed thoroughly, which is found to be insecure against the active attack of the operators in the base station to impersonate the legal users. A new authentication and key distribution scheme is designed using Rabin public-key cryptosystem,which is superior to the MSR+DH scheme in both security and complexity.

本文详细分析了文献[1]中MSR+DH方案的安全性,指出了该方案的不安全性:无法防止基地站的操作人员假冒合法用户进行的主动攻击。本文利用Rabin公钥密码体制,重新设计了一个新的身份认证和密钥分配方案,该方案在安全性和实现复杂度方面均优于MSR+DH方案。

It is one of the important contents to distinguish legal users in computer security and secrecy. This paper puts forword an effective method to distinguish legal users. The method is typical of good anti-conjecture and quick realization.

识别合法用户是计算机安全保密的一项重要内容。本文提出了一种有效的识别合法用户的方法,该方法具有良好的抗猜测性,而且易于实现。

The paper introduces a small program which is developed for Intranet to display the login user name on Auto CAD window to remind the legal user to login.

本文介绍的小程序用于单位内部局域网,在Auto CAD R14 窗口上显示登录用户姓名,以提醒用户合法登录。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关legal users的内容
在知识搜索中查有关legal users的内容
在数字搜索中查有关legal users的内容
在概念知识元中查有关legal users的内容
在学术趋势中查有关legal users的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社