私有信息

  • 网络Private information;proprietary information
私有信息私有信息
  1. 这种利用Internet来传输私有信息而形成的逻辑网络就称为虚拟私有网。

    Such uses the Internet to transmit the private information to form the logic network is called the Virtual Private Network .

  2. 由于每个领域、每个单位都有自己的私有信息,要对外界保密,因此在企业信息网络与Internet之间就要有诸如防火墙、身份认证等安全措施。

    As each area or each unit has its own private information confidential to the outside world , so there would be firewalls , authentications and other security measures between the enterprise information network and the Internet .

  3. VPN可以使企业能够在Internet上既安全又经济地传输私有信息。

    The advent of VPN makes it possible for enterprises to transform private message securely and economically via the Internet .

  4. 然而,目前的Agent协商学习算法多存在于协商过程中,在协商前,Agent个体自身信念中对于交互对手的私有信息认知程度还不高。

    However , the current Learning algorithms of the Agent negotiation exist only in the process of the negotiation . The Agents also lack for knowledge about their opponents before negotiation .

  5. 因此,您应该将CA证书和其他签名证书放入信任存储库,并将私有信息(含有私钥的个人证书)放入密钥存储库中。

    Thus , you should place CA certificates and other signing certificates in a trust store and private information ( personal certificates with private keys ) in the key store .

  6. 他们两个人都不想把自己私有信息告诉对方,但是Alice又想知道这两块面积的大小这一问题。

    Both of them do not want to tell each other their private information , but Alice want to know the two divided areas .

  7. 虚拟专用网VPN(VirtualPrivateNetworks)是解决公共网络中私有信息安全传输的重要技术,而安全套接层协议SSL(SecureSocketsLayer)是近年来兴起的一种实现VPN的有效方法。

    Virtual Private Network ( VPN ) is an important technique transfer private information under public networks , and SSL ( Secure Sockets Layer ) protocol is a new techniques to implement VPN .

  8. 虚拟专用网(VPN)是解决开放网络中私有信息安全传输的重要技术,而IPSec(IP安全协议)是实现VPN的有效手段。

    Virtual private network ( VPN ) is an important technique to transfer private information under open network , and IPSec ( IP security ) is the efficient measure realizing VPN .

  9. 举例来说,在对一个大型公司的调查中表明,利用XSS攻击窥视用户的信用卡号码和私有信息是可能的。

    For example , in one audit conducted for a large company , it was possible to peek at the user 's credit card number and private information by using an XSS attack .

  10. 空间几何对象相对位置判定中的私有信息保护

    Privacy Protection in the Relative Position Determination for Two Spatial Geometric Objects

  11. 基于私有信息引起的非对称信息的误定价模型;

    Model of Mispricing Based on Asymmetric Information Resulted from Private Information ;

  12. 第5章实现了保护私有信息的范围查询问题。

    In Chapter 5 , we discuss range searching problem .

  13. 保护私有信息的安全查询问题可以转化为保护私有信息的点包含问题,该问题广泛应用于竞标、拍卖以及数据库查询等方面,而目前对其研究相对较少。

    The privacy-preserving safety query problem can convert into the point-inclusion problem .

  14. 基于私有信息保护的线性回归安全算法

    Secure Algorithm of Linear Regression under Private Information Protection

  15. 保护私有信息的三角不等式判定协议及其应用

    A Privacy-Preserving Triangle Inequality Determination Protocol and Its Applications

  16. 同时,有研究表明内幕交易往往与信息操纵是相伴而生的,所以本文对年度盈余预告消息类型与内部人持股变动关系进行研究,以期检验内部人是否利用私有信息进行交易。

    Also , studies have shown that insider trading is accompanied by information manipulation .

  17. 基于CC/PP的普适计算中私有信息保护问题的研究

    Research of protecting private information in ubiquitous computing environment based on CC / PP

  18. 一些基于私有信息保护的计算几何问题研究

    Researches on Computational Geometry Based on Privacy Protecting

  19. 保护私有信息集合包含协议的设计与分析

    Design and Analysis of Private-preserving Set Inclusion Protocol

  20. 保护私有信息的叉积协议及其应用

    Privacy-Preserving Cross Product Protocol and Its Applications

  21. 基于R~2的中国股市私有信息套利分析

    Private Information Arbitrage in Chinese Stock Market : A Study Based on R ~ 2

  22. 分析了信息结构&信息组成、私有信息的分布、信息的准确性和信息的存在性对企业产权资本成本的影响,并进行了实证检验。

    3rd . The impact of information attributes on the cost of equity capital is analyzed .

  23. 一种用来保护私有信息的K-匿名模型

    A K-anonymity model for protecting privacy

  24. 像保护自己的信息一样去保护员工个人信息、公司或竞争者的私有信息。

    Protect employee 's personal information , company or competitors'proprietary information as if it were your own .

  25. 保护私有信息的最近点对问题在军事特别是空间领域、商业领域有着重要的应用前景。

    Privacy-preserving closest pair problem can be applied to military ( especially in space ), commercial enterprises .

  26. 本文的主要工作有:首先,保护私有信息的多方排序问题。

    The main work of this article as follow : At first , two protocols for privacy-preserving multi-rank .

  27. 不知情交易者可以通过分析指令簿和指令成交记录来猜测私有信息的价值。

    Uninformed traders can guess the value of private information by analyzing the order book and deal record .

  28. 最后,说明知情交易者如何利用市场深度的限制隐藏其私有信息。

    And lastly , the model shows how informed trader hide their private information by making use of depth .

  29. 客户信息作为银行私有信息的价值就在于这些信息能够产生信息租金。

    As the private information of bank , the value of customer information is the information rent it causes .

  30. 理论分析表明,在无可信第三方参与的情况下,能够很好的隐藏访问权限数据,保护数据拥有者和查询者的私有信息。

    The theoretical analysis shows that without the Trust Third Party , the model can hide access control information well .