| 1. | It security techniques - non - repudiation - general It安全技术.抗抵赖.概述 |
| 2. | Before we cover that , let s talk about nonrepudiation 在讨论这个问题之前,我们先说一说抗抵赖。 |
| 3. | Information technology - security techniques - non - repudiation - part 1 : general 信息技术安全技术抗抵赖第1部分:概述 |
| 4. | Supporting sign verification ; providing business integrality and anti - denial safeguard 支持业务的签名验证功能,提供业务完整性与抗抵赖性保障 |
| 5. | Information technology - security techniques - non - repudiation - part 2 : mechanisms using symmetric techniques 信息技术安全技术抗抵赖第2部分:使用对称技术的机制 |
| 6. | Information technology - security techniques - non - repudiation - part 3 : mechanisms using asymmetric techniques 信息技术安全技术抗抵赖第3部分:使用非对称技术的机制 |
| 7. | Information technology - open systems interconnection - security frameworks for open systems - part 4 : non - repudiation framework 信息技术开放系统互连开放系统安全框架第4部分:抗抵赖框架 |
| 8. | Nonrepudiation provides evidence that a particular action occurred and can be traced to a specific entity user or business 抗抵赖性提供了发生过某个动作的证据,并且可以跟踪到特定的实体(用户或者公司) 。 |
| 9. | 3 . base on the theory of embedded database and the requirement of security services , an embedded database is analyzed and realized , which can provide authentication services , access control services and nonrepudiation services 基于嵌入式数据库和eiscp对安全服务的需求,设计并实现了包含用户信息表和访问日志表的数据库,提供身份认证、访问控制和抗抵赖服务。 |
| 10. | Higher security level is required while more and more commerce activities and government affairs are done over lntemet . the authentication of activity paticipates , the confidential ofdat4 the integrity of data and the ability to anti - disavow are the most important ones among all security requirements 利用开放式网络开展商务和政务活动对网络的安全性提出了更高的要求,最为重要的安全性要求包括:参与方的身份认证,会话的机密性,会话的完整性和抗抵赖性。 |