期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
英语电影片名汉译法探索 被引量:6
1
作者 夏妮 《三峡大学学报(人文社会科学版)》 2002年第6期72-73,共2页
翻译英语电影的片名必先注意它的重要性 ,然后在完全理解整部电影的基础上再注意艺术性和文化性 ,灵活运用直译、意译、减字、加字。
关键词 英语电影片名 直译 意译 加字法 转换 英译文 翻译方
下载PDF
文言文翻译的方法
2
作者 宋丙彪 李静 《考试(高中)》 2003年第10期4-4,共1页
文言文翻译的方法,有直译和意译两种。直译,要求原文字字在译文中有着落,译文字字在原文中有根据,句式特点,风格力求和原文一致。意译则是译出原文大意。翻译时应以直译为主,实在难以直译时可辅助以意译。翻译的具体方法有:1、加字法。... 文言文翻译的方法,有直译和意译两种。直译,要求原文字字在译文中有着落,译文字字在原文中有根据,句式特点,风格力求和原文一致。意译则是译出原文大意。翻译时应以直译为主,实在难以直译时可辅助以意译。翻译的具体方法有:1、加字法。即在单音节词之后加字,使之成为双音节词或短语。例如:故予与同社社诸君子哀斯墓之徒有其石也而为之记,亦以明死生之大(重大意义),匹夫之有重(重要作用)于社稷也。(《五人墓碑记》) 展开更多
关键词 文言文 翻译方 直译 意译 加字法 高考 语文 解题技巧 专题复习
下载PDF
论商标翻译 被引量:6
3
作者 张万义 陈建杰 《泉州师范学院学报》 2004年第3期107-112,共6页
全球经济日趋一体化,商品在世界范围内的竞争也日趋激烈。作为商品符号的商标起着举足轻重的作用,商标的翻译也就不可忽视。本文从商标的定义及分类、商标翻译的原则及技巧和商标翻译中应注意的事项论述如何提高商标翻译的质量。
关键词 商标 翻译 音译 意译 加字法 文化背景 岐义
下载PDF
A DIGITAL SIGNATURE-BASED VISUAL CRYPTOGRAPHY SCHEME FOR IMAGE DISCRIMINATION AND MANAGEMENT 被引量:1
4
作者 Han Yanyan Hu Yupu He Wencai 《Journal of Electronics(China)》 2009年第5期631-636,共6页
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat... Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect. 展开更多
关键词 Visual cryptography Digital signature Time-stamp
下载PDF
Multi-Level Cryptographic Functions for the Functionalities of Open Database System
5
作者 Akinwale Taofiki Adio Adekoya Felix Adebayo Ooju Emmanuel Oluwafemi 《Computer Technology and Application》 2011年第9期730-735,共6页
The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functio... The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functionalities such as open password entry with active boxes, combined encryption methods and agent that can be incorporated into an open database system. It designed and implemented an algorithm that would not allow users to have free access into open database system. A user entering his password only needs to carefully study the sequence of codes and active boxes that describe his password and then enter these codes in place of his active boxes. The approach does not require the input code to be hidden from anyone or converted to place holder characters for security reasons. Integrating this scheme into an open database system is viable in practice in term of easy use and will improve security level of information. 展开更多
关键词 Database system CRYPTOGRAPHY agent random number PEER-TO-PEER algorithm
下载PDF
Cryptography with Elliptic Curve Using Tifinagh Characters
6
作者 Fatima Amounas El Hassan El Kinani 《Journal of Mathematics and System Science》 2012年第2期139-144,共6页
The paper describes the concept of plaintext encryption by using the Unicode characters. In the case of elliptic curve cryptography, there is not specified rule or algorithm to specify the letters of Tifinagh as well ... The paper describes the concept of plaintext encryption by using the Unicode characters. In the case of elliptic curve cryptography, there is not specified rule or algorithm to specify the letters of Tifinagh as well as special characters. So, the paper gives the transformation of characters Tifinagh into points on elliptic curve by using the corresponding characters Latin. The obtained correspondence has been applied in Menezes-Vanstone cryptosystem based on elliptic curve. Therefore, the paper explains in detail its implementation in Maple 12. 展开更多
关键词 CRYPTOGRAPHY elliptic curve elliptic curve cryptography UNICODE Tifinagh characters ENCRYPTION DECRYPTION implementation.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部