privacy procedure

英 [ˈprɪvəsi prəˈsiːdʒə(r)] 美 [ˈpraɪvəsi prəˈsiːdʒər]

网络  保密过程; 隐私程序

计算机



双语例句

  1. Problems and Countermeasures Concerning the Theory of Right of Action in Civil Cases Protection of the Right of Privacy in Investigative Procedure
    我国民事诉权理论存在问题及对策分析&由郑传本名誉侵权案引出的法律思考刑事侦查活动中对犯罪嫌疑人隐私权的保护
  2. Restriction and Protection: The Due Pleading of Privacy in Criminal Procedure
    限制与保护:刑事诉讼中的隐私权
  3. Protection of the Right of Privacy in Investigative Procedure
    刑事侦查活动中对犯罪嫌疑人隐私权的保护
  4. This paper describes the security protocol of 802.16. Based on the privacy sub-layer, it analyzes the procedure of authentication request from the subscriber station to the base station. Also it describes the procedure of key exchange and way of data encryption.
    分析了它的安全机制,从协议栈的安全加密子层着手,分析了用户站向基地站认证过程,认证之后的会话密钥交换过程以及获取会话密钥之后的数据加密方式。
  5. The minimal requirements of the procedural justice of criminal detection applied to all the modern civilized society are: procedural participation, neutrality of detectors, humanities, individual privacy, consent, procedural rule by law and timely conclusion of the procedure.
    适用于所有现代文明社会的最低限度的刑事侦查的程序正义要求是:程序的参与性、侦查者的中立性、人道、个人隐私、同意、程序法治、程序的及时终结性。
  6. Therefore, brings into line with the privacy detection measure Law of Criminal Procedure the unification adjustment category, is clear about its utilization program is the our country Law of Criminal Procedure development inevitably requirement.
    因此,将秘密侦查措施纳入刑事诉讼法的统一调整范畴,明确其运用程序是我国刑事诉讼法发展的必然要求。
  7. The constant change and development of social reality cause the scope of privacy in the procedure of investigation with uncertainty.
    而社会现实的不断变化和发展致使侦查程序中隐私权的范围具有不确定性。
  8. At the initial stage, the evidences which were obtained by violate the civil property rights, privacy, can be used in the sentencing procedure.
    在初期,对于侵犯公民财产权、隐私权等获取的证据,如果查证属实的,可以在量刑中予以使用。
  9. Users 'privacy can not be fully guaranteed in the procedure of transportation and computation with security measures like authentication and authorization.
    考虑到网格的资源共享特征也带来了安全隐患,仅有授权和认证等安全措施还难以保证用户隐私在传输及计算等过程中不被泄漏。