您要查找的是不是:
- Know that it would like to use the RSA authentication protocol. 它想使用RSA认证协议。
- You must select at least one password authentication protocol. 您至少要选择一个密码身份验证协议。
- Secure identity authentication protocol is the kernel of authentication system. 安全可靠的身份认证协议是认证系统的核心。
- An electronic voting-based file authentication protocol(EV-FAP) is presented. 提出了一种基于电子投票的文件真实性认证协议。
- The procedure outlined in the table describes how to configure PPP encapsulation and PAP/CHAP authentication protocols. 在表格中摘要的步骤是叙述如何组态点对点协定封装以及密码验证协定(PAP)/查问式握换验证协定(CHAP)的验证协定。
- Kerberos protocol is an authentication protocol based on private key cryptosystem. Kerberos协议是基于私钥密码系统的身份认证协议。
- Authentication protocols based on traditional USB Key are unable to process complex encryption/decryption data and lead to many disadvantages. 传统的USB Key只能存储数据而无法进行复杂的加/解密运算,导致基于USBKey的认证协议存在诸多不足。
- The proposed security and authentication protocol made use to the combination of public key and secret key to provide such ploy. 这种方法采用的认证协议同时结合了公钥加密和密钥加密技术。
- A new authentication protocol based on 3G-WLAN interworking networks is proposed. 摘要提出了基于无线局域网和3G互联网络的接入认证协议。
- A new identity based non-interactive deniable authentication protocol is proposed. 摘要 提出了一种新的可否认认证协议。
- Kerberos is a network authentication protocol that allows one computer to prove its identity to another across an insecure network through an exchange of encrypted messages. KERBEROS 是一种网络认证协议,允许一台计算机通过交换加密消息在整个非安全网络上与另一台计算机互相证明身份。
- In the first article of the series, Daniel Robbins focuses on introducing the RSA and DSA authentication protocols and showing you how to get them working over the network. 在本系列的第一篇文章里,Daniel Robbins主要介绍RSA和DSA认证协议并向您展示如何在网络上应用这些协议。
- In this article, we ll take a good look at how to correctly use RSA and DSA authentication protocols without exposing ourselves to any unnecessary security risks. 本文中,我们将详细讨论如何正确使用RSA和DSA认证协议,使我们不会冒任何不必要的安全性风险。
- Instance for use with SMTP to the credential cache and associates it with a host computer, port, and authentication protocol. 实例并将其与主机、端口和身份验证协议关联。
- The Kerberos authentication protocol is a security protocol that verifies data to help ensure that both user and network services are safe. Kerberos身份验证协议是一种安全协议,用于验证数据以帮助确保用户和网络服务均是安全的。
- Kerberos is a authentication protocol based on KDC and symmetry key cryptography. It is used suitably in a physical insecurity network. Kerberos是基于可信第三方KDC使用对称密钥加密算法的认证协议,适合在一个物理网络并不安全的环境下使用。
- Based on the absolute distributed certificate authority almost any standard public-key-based authentication protocol could be adopted directly. 基于完全分布式的认证中心,可以直接采用几乎所有的标准公钥认证协议。
- MySQL 4.1 and up uses an authentication protocol based on a password hashing algorithm that is incompatible with that used by older clients. 1及其后版本验证协议使用的密码哈希算法与老的客户端不兼容。
- It’s considered valuable to sup- port multiple security levels for broadcast authentication protocols in wireless sensor networks.A design of such protocols is also proposed. 初步探讨了无线传感器网络广播认证协议分级安全功能支持的意义,并给出了相应的方案设计思路。
- After the analyzing the three familiar protocols: Kerberos, TACACS+ and RADIUS protocol, JAS protocol, an authentication protocol designed by us, is introduced in this paper. 该协议是一种与RADIUS协议兼容的身份认证协议,并且已经成功地应用在捷普拨号服务器中。
- 今日热词
-
- 深远海浮式风电平台 - deep-sea floating wind power platform
-
- 京雄高速公路 - Beijing-Xiongan expressway
-
- 农业及相关产业增加值 - the added value of agriculture and related industries