privacy system

英 [ˈprɪvəsi ˈsɪstəm] 美 [ˈpraɪvəsi ˈsɪstəm]

保密(通信)制

计算机



双语例句

  1. Implement the APEC Cross Border Privacy Rules System to reduce barriers to information flows, enhance consumer privacy, and promote interoperability across regional data privacy regimes;
    执行《亚太经合组织跨境隐私规则体系》(APECCrossBorderPrivacyRulesSystem),以减少信息流动障碍,加强消费者隐私保护,促进整个地区数据隐私保护体系的互通性;
  2. Those legislations on privacy protection centered on civil law are inadequate to protect workers, so we should establish a privacy protection system corresponding to labor law.
    以民法为中心的隐私权立法不足以保护劳动者,应构建契合劳动法理念的隐私权保护制度。
  3. Describe the weaknesses of your approach and how you would compromise privacy in your system if you were a medical knave.
    如果你是一个医学上的高手,请在你的系统中阐述你的方法的弱点和你是如何揭开秘密的。
  4. Windows Doctor also provides functions such as Registry Cleanup, Privacy Cleanup, System Speed-Up and Advanced Tools.
    它有一些普通的功能,比如注册表清理、隐私清除、系统优化、启动加速等等。
  5. Study of Security and Privacy Aspects in RFID System
    RFID系统中安全和隐私问题的研究
  6. The Research of the Chaos Sequence and Its Application in Privacy Commumication System
    混沌序列的研究及其在保密通信系统中的应用
  7. This paper discusses the ethical issues in the information systems, such as the privacy, security and system quality.
    论文从信息系统的范畴和角度,参考发达国家对道德伦理问题的研究,重点探讨了信息系统的隐私、安全以及质量等方面存在的争议和矛盾。
  8. The features of network such as its openness, emulative function, digitalization, no-use-of paper, mutability and high efficiency have exerted great influences on the existing privacy protection system.
    互联网的开放性、虚拟性、技术性、数字化、无纸化、交互性、高效率等诸多特征已经对现行的隐私保护制度产生了重要的影响。
  9. On Improvement of Privacy Right Protection System in Internet Environment
    论网络环境隐私权保护制度的完善
  10. Dynamic Cipher Application in the Privacy Information System
    动态密码在保密信息系统中的应用
  11. Overall Technology Programme Design of Jilin Province Postal Computer Network Safe Privacy System
    吉林省邮政综合计算机网安全保密系统总体技术方案设计
  12. The test model of random phasic signal and its application in the mobile privacy radio system
    随机相位信号检测模型及其在移动通信保密系统中的应用
  13. Meanwhile, technology can also affect the protection of the building and development of privacy system.
    同时,科学技术是影响保护隐私权制度建立和发展的主要因素。
  14. A Study on Privacy for LBS System
    LBS系统的私密性研究
  15. At present, China is still in the wait-and-see stage on the issue, therefore, it is necessary to China's national conditions, appropriate legislative experience from abroad, the establishment of our network privacy protection system.
    目前我国对此问题基本上仍处于观望阶段,因此,有必要根据我国的国情,适当借鉴国外立法经验,建立我国的网络隐私保护制度。
  16. So it is necessary to space of the privacy of legal position, type, responsibility constitute infringement, in reference to a foreign law is based on the experience of the space form our country privacy protection system.
    因此在这里,作者认为有必要对空间隐私权的法律定位、侵权类型、责任构成进行研究,并计划在本文里通过借鉴外国法的经验,提出完善我国的空间隐私权保护制度的设想。
  17. The present stage does not establish a perfect network privacy protection system.
    我国现阶段并未建立完善的网络隐私权保护体系。
  18. Then proposed a civil protection first other mechanism of network privacy protection system supplemented.
    然后提出建立以民事保护为主其他机制为辅的保护体系。
  19. Thirdly, create and complete individual privacy protection law system to make sure consumer rights are far away from been violated.
    第三,建立和完善网络交易中消费者个人隐私保护法律制度,确保消费者的隐私权不受侵犯。
  20. The third part based on the comprehensive analysis of the above, combined with the actual situation in our country, proposed consummates our country consumer privacy protection system in network consumption.
    第三部分在综合分析前文的基础上,结合我国实际情况,提出完善我国网络消费中消费者隐私权保护制度的建议。
  21. The main work and innovations are as the followings: 1. The characteristics and the threats to security and privacy of RFID system are analyzed, and then the requirements of RFID security and privacy are analyzed and defined.
    主要工作及创新点如下:1、分析了RFID系统的特点和存在的安全与隐私威胁,分析并定义了RFID安全性和隐私性要求。
  22. The design of security and privacy protocols should based on a specific model that including the capacity adversary, security and privacy objects and system settings. The security and privacy properties of the protocol should also be verified by the model.
    安全隐私协议的设计需要基于特定的模型,包括敌手能力、安全隐私目标和系统设置,且协议的安全隐私属性也需要借助特定的模型进行验证。
  23. In this thesis, some researches on how to enhance security and privacy of RFID system and innovative application of RFID tags are done.
    本文就如何加强RFID系统安全性和隐私性,以及RFID标签的创新性应用,做了一些研究。
  24. The approach to realize the balanced state is to give the relative rights of independent business entity to the bank. In terms of value orientation in the establishment of customer privacy protection system, customer privacy protection is always primary and the exception is the secondary.
    实现平衡的方法是确立银行具备独立经营主体的相对权利,在建立隐私保护制度的价值取向上确定保护客户隐私是第一性的,例外才是第二性的。
  25. This article main text altogether three parts, using the comparison study, how should the analysis legal science establish the network right of privacy protection system to our country to carry on the analysis and the discussion.
    本文正文共三部分,运用比较学、分析法学对我国应该如何建立网络隐私权保护制度进行了分析和探讨。
  26. The EU financial privacy protection legal system 'Personal Data Protection Directive' was enacted primarily because of two world wars to bring them fear, and its financial privacy protection requirements with a unified standard.
    而欧盟金融隐私保护法律制度主要是《个人数据保护指令》,其对金融隐私保护要求用统一的标准,这部法律的制定主要是源于两次世界大战给他们带来的恐惧。
  27. These features make the mobile RFID system face more serious security and privacy challenges than RFID system.
    上述特点使得移动RFID系统比RFID系统面临着更加严峻的安全与隐私的挑战,因此必须要设计新的适合于移动RFID系统的安全认证协议,来满足用户对安全与隐私的需求。
  28. So take it as the basis to realize the chaos synchronization is more appropriate. The system simulation result indicated that The Lorenz chaos system is very suit for the designing needs of chaos synchronization privacy communication system.
    以其为依据实现混沌同步更为合适。系统仿真结果表明采用Lorenz混沌系统可以很好的满足混沌同步保密通信系统的设计需要。
  29. Last foreign patient privacy rules and practices, looking for patient privacy protection law system in China to further improve the ways.
    最后借鉴国外患者隐私权保护的相关规定和惯例,寻求我国患者隐私权保护在法律制度上进一步完善的途径。
  30. Among them, malicious chargeback, privacy theft, and system damage are the main hazards of malwares.
    其中,恶意扣费、隐私窃取、系统破坏成为恶意软件的主要危害。