您要查找的是不是:
- Physical Access Authentication 物理权限认证
- Franks J,Hallam-BakerP.HTTP Authentication:Basic and Digest Access Authentication[S].RFC2617,1999-06. 曾剑平;郭东辉.;一种基于可信度计算的集成身份认证与访问控制的安全机制[J]
- One of the strongest encryption algorithms used by remote access authentication products is the widely tested and implemented industry-standard Data Encryption Standard (DES). 经广泛测试、并成为工业界标准的数据加密标准(DES)是远程访问认证产品中最强的加密算法之一。
- This paper proposes a hierarchical access authentication mechanism based on MIP-RR. 提出一种基于MIP-RR协议的层次化接入认证机制。
- The design of this paper referenced HTTP Digest Access Authentication and implemented the authentication of user's identity. 本文的设计中参考了http的摘要认证机制,实现了对用户身份的认证。
- Is physical access to computing resources and communication links controlled and monitored? 有否管制和监察进入存放电脑资源及通讯链路人士的身分?
- This paper first describes the technology features of LMDS and IEEE 802.1x specification,and then gives a security access authentication modle for LMDS. 首先简单介绍了LMDS的技术特点以及最新的IEEE802.;1x标准;然后在此基础上;提出了一个适合LMDS的安全接入认证模型。
- The eavesdropper needs to gain physical access to the phone to download and install the spying program. 但窃听者必须实际接触到手机,才能把间谍程式下载并安装到该手机内。
- Compared with access authentication mechanism based on base mobile IP protocol,security and encryption for the mechanism are enhanced,which can resist common security att... 相比基本移动IP协议的接入认证方法,该方法的加密强度和安全性更高,可以更有效地抵御常见的安全攻击。
- While physical access to an input device is no longer a problem, the same sorts of issues we raised above otherwise apply. 虽然对输入设备的物理访问已不再是问题,而应用时还会发生同类问题。
- I don't give this test as much weight, since a typical commercial keylogger has to be installed by someone who has physical access to your computer. 我对这项测试看得并不是很重,因为典型的商业键盘记录必须由能够对你的电脑进行物理访问的人进行安装。
- Evaluate the design, implementation and monitoring of physical access controls to ensure that information assets are adequately safeguarded. 评估物理访问控制的设计、实施和监控,确保信息资产充分地安全。
- Any person with physical access to the machines and a moderate amount of computer knowledge could have hacked into them to produce any outcome desired. 一般人只要能够接触到机器,同时具备普通程度的电脑知识,就可以入侵机器,做出任何他们想要的结果。
- Point Of Presence (POP) is the physical access location interface between a local exchange carrier and an Interexchange Carrier fiber network. 汇集点是本地交换运营商和内部交换运营商光纤网络之间的物理访问位置界面。
- The thief might get physical access to the hard drive, but without knowing the right passphrase, the data on the hard drive will look like random characters. 盗贼或许可以访问硬盘,但是没有正确的口令,硬盘上的数据看起来就像是随机的字符。
- The main aspect that makes wireless security different than security of wired networks is the uncontrollability of physical access due to transmission of data with radio waves. 由于数据的传输,使无线的安全不同胜于以线加强网络的安全的主要的方面以电波是身体通路的无法控制性。
- "I want, life is a natural hangover," which many people thought was deployed in the home, a mind and desire in lush tranquil, spiritual and physical access to a genuine leisure. “我要的,是一种自然生活的回味”,这种思想是许多人在布置家居时的一种初衷,人们渴望在平旷宁静中,让心灵与身体获得一种真正的休闲。
- access authentication based on users 基于用户访问认证
- There will be circumstances where physical access to the switch can be achieved, but access to the User or Privileged EXEC mode cannot be gained because the passwords are not known or have been forgotten. 会有一些情况必须实际存取交换器,但因为不知道或忘掉密码,就不能够取得存取使用者或特权的执行模式的权力。
- For an embedded core, which is deeply embedded in the system chip, direct physical access to its peripheries is not available by default;hence, additional access mechanisms are required. 由于嵌入核与芯片的输入/输出管脚没有直接通路,因此需要设计专门的测试通路结构对它们进行测试,以减少测试时间,降低测试成本。