您要查找的是不是:
- Previously a usermap was only supported for ident authentication. 允许一个用户映射参数指向所有扩展认证方法。
- PKI can provide identity authentication and role access control service. PKI技术能够提供身份鉴别和角色控制服务。
- Secure identity authentication protocolis the kernel of authentication system. 安全可靠的身份认证协议是认证系统的核心。
- Secure identity authentication protocol is the kernel of authentication system. 安全可靠的身份认证协议是认证系统的核心。
- Password authentication is the key factor in identity authentication. 口令认证是身份认证的关键因素.
- The IKE protocol and the identity authentication of IK E are introduced. 分析了IKE协议及IKE协议中的验证方式。
- With the development of information science, identity authentication is used increasingly wilder in our life. 随着信息技术的飞速发展,利用生物特征进行身份认证正广泛的被应用于各种场合。
- This thesis, on the base of Kerberos Protocol, makes the research in depth for the network identity authentication. 本文根据这一实际需求,在Kerberos协议的基础之上,对网络身份认证进行了深入的研究。
- It is a set of programming interfaces that abstracts identity authentication, message origin authentication and integrity, and message confidentiality. 这是一套编程接口,抽象了身份验证、消息源验证和完整性。
- To configure identity authentication, data encryption, or terminal window and scripting options, click the Security tab. 要配置身份验证、数据加密或终端窗口和脚本选项,请单击安全性选项卡。
- An SMS-based one-time password generated by the bank and sent to your mobile phone for additional identity authentication. 银行向你的手提电话发出只用一次的密码短讯,作为额外核证之用。
- A ploy to ensure the security distribution of the key and the identity authentication of the peers in P2P network is provided in this paper. 摘要文章提出了一种在P2P网络中安全分发密钥和进行对等点身份认证的方法。
- In order to solve the identity authentication in the cyberworld, it's very necessary to introduce Public Key Infrastructure (PKI). 为了解决网络世界中的身份认证问题,就必须引入公钥基础设施(PKI)。
- However, there are some problems in IBE such as identity authentication, private key distribution, key escrow and so on. 同时,基于身份加密的公钥密码系统中也存在着一些问题,如身份认证、私钥分发以及密钥托管等。
- The protection of key material is absent from PSK identity authentication mode in the IKE protocol that affects the mechanism of security in it. 摘要指出了现有IKE协议的PSK身份认证模式缺乏对密钥生成材料的保护,对整个协议的安全性有不利的影响。
- The paper introduces two schemes of identity authentication:the authentication based on password and the authentication based on digital certificate. 对基于口令的身份认证机制和基于数字证书的身份认证机制分别进行了介绍。
- The modes and applications of identity authentication in common used E-Procurement System (EPS) are analyzed in this paper firstly. 摘要分析了电子采购系统身份认证的常用方式及应用;
- Identity authentication for user login is very important to the operation system,and is the basis for building the trus-ted computing environment. 摘要 用户登录身份认证是建立操作系统可信性的一个非常重要的环节,是建立可信计算环境的基础。
- Abstract :Unique Identity Authentication system (UIA ) manage user and campus each in charge of speaking to the system (member site ) in unison. 摘要:统一身份认证子系统(UIA子系统)统一管理用户和校园内各个分管理系统(成员站点)。
- On the research of the whole access identity authentication, including protocol, client and server, the frame of authentication system in which has been put forward. 并以借此研究了整个接入用户身份认证系统,包括认证协议、认证客户端、认证服务器端,提出了园区网络认证系统的整体框架。