您要查找的是不是:
- Know that it would like to use the RSA authentication protocol. 它想使用RSA认证协议。
- You must select at least one password authentication protocol. 您至少要选择一个密码身份验证协议。
- Secure identity authentication protocol is the kernel of authentication system. 安全可靠的身份认证协议是认证系统的核心。
- An electronic voting-based file authentication protocol(EV-FAP) is presented. 提出了一种基于电子投票的文件真实性认证协议。
- Kerberos protocol is an authentication protocol based on private key cryptosystem. Kerberos协议是基于私钥密码系统的身份认证协议。
- The proposed security and authentication protocol made use to the combination of public key and secret key to provide such ploy. 这种方法采用的认证协议同时结合了公钥加密和密钥加密技术。
- A new authentication protocol based on 3G-WLAN interworking networks is proposed. 摘要提出了基于无线局域网和3G互联网络的接入认证协议。
- A new identity based non-interactive deniable authentication protocol is proposed. 摘要 提出了一种新的可否认认证协议。
- Kerberos is a network authentication protocol that allows one computer to prove its identity to another across an insecure network through an exchange of encrypted messages. KERBEROS 是一种网络认证协议,允许一台计算机通过交换加密消息在整个非安全网络上与另一台计算机互相证明身份。
- Instance for use with SMTP to the credential cache and associates it with a host computer, port, and authentication protocol. 实例并将其与主机、端口和身份验证协议关联。
- The Kerberos authentication protocol is a security protocol that verifies data to help ensure that both user and network services are safe. Kerberos身份验证协议是一种安全协议,用于验证数据以帮助确保用户和网络服务均是安全的。
- Kerberos is a authentication protocol based on KDC and symmetry key cryptography. It is used suitably in a physical insecurity network. Kerberos是基于可信第三方KDC使用对称密钥加密算法的认证协议,适合在一个物理网络并不安全的环境下使用。
- Based on the absolute distributed certificate authority almost any standard public-key-based authentication protocol could be adopted directly. 基于完全分布式的认证中心,可以直接采用几乎所有的标准公钥认证协议。
- MySQL 4.1 and up uses an authentication protocol based on a password hashing algorithm that is incompatible with that used by older clients. 1及其后版本验证协议使用的密码哈希算法与老的客户端不兼容。
- Subsequently, we put forward an enhanced improved wireless authentication plan EAP-IWAPI to be applied as a kind of authentication protocol in IEEE 802.11i. 随后提出一种增强的改进无线认证方案EAP-IWAPI作为IEEE 802.;11i下的一个认证协议使用。
- It analyzes IEEE 802.1x port-based access control protocol, EAP (extensible authentication protocol), EAP/RADIUS protocol and dynamic key management protocol. 主要分析研究了IEEE 802.;1x基于端口的访问控制协议、EAP可扩展认证协议、EAP/RADIUS协议和动态密钥管理协议,在此基础上提出了无线局域网的安全接入系统解决方案。
- The requirement of supporting multiple authentication in single sign-on scheme often complicates the realization of authentication protocol and cross-realm authentication. 摘要支持多认证方式的单点登录是目前的一个新需求,通常这又使认证协议的实现和跨域的认证更加复杂。
- Therefore once the security requirement in single prover condition is satisfied the identity authentication protocol can also be run in multi-provers condition. 因此,只要满足了其中单证明者环境下的安全要求,身份认证协议也能安全地运行在多个证明者的环境下。
- Geometric approaches were used instead of public-key technologies such as disperse logarithm problem to form and exchange the messages in password authentication protocol. 口令认证协议中消息的形成与交换,采用几何方法代替基于离散对数难题等公钥技术。
- Each Operator Site is responsible for selecting and implementing an authentication protocol that is compatible with the publishers API,as well as providing a new user sign-up mechanism. 每个操作入口站点(Operator Site)都负责选择和实现一种与发布API相兼容的授权协议,同时提供新用户的注册机制。
- 今日热词
-
- 深远海浮式风电平台 - deep-sea floating wind power platform
-
- 京雄高速公路 - Beijing-Xiongan expressway
-
- 农业及相关产业增加值 - the added value of agriculture and related industries