您要查找的是不是:
- After the analyzing the three familiar protocols: Kerberos, TACACS+ and RADIUS protocol, JAS protocol, an authentication protocol designed by us, is introduced in this paper. 该协议是一种与RADIUS协议兼容的身份认证协议,并且已经成功地应用在捷普拨号服务器中。
- Authentication protocol design 认证协议设计
- Know that it would like to use the RSA authentication protocol. 它想使用RSA认证协议。
- You must select at least one password authentication protocol. 您至少要选择一个密码身份验证协议。
- Secure identity authentication protocol is the kernel of authentication system. 安全可靠的身份认证协议是认证系统的核心。
- An electronic voting-based file authentication protocol(EV-FAP) is presented. 提出了一种基于电子投票的文件真实性认证协议。
- Kerberos protocol is an authentication protocol based on private key cryptosystem. Kerberos协议是基于私钥密码系统的身份认证协议。
- The proposed security and authentication protocol made use to the combination of public key and secret key to provide such ploy. 这种方法采用的认证协议同时结合了公钥加密和密钥加密技术。
- A new authentication protocol based on 3G-WLAN interworking networks is proposed. 摘要提出了基于无线局域网和3G互联网络的接入认证协议。
- A new identity based non-interactive deniable authentication protocol is proposed. 摘要 提出了一种新的可否认认证协议。
- Kerberos is a network authentication protocol that allows one computer to prove its identity to another across an insecure network through an exchange of encrypted messages. KERBEROS 是一种网络认证协议,允许一台计算机通过交换加密消息在整个非安全网络上与另一台计算机互相证明身份。
- Realization of LOTOS formal specification is one of indispensable steps in protocol design. LOTOS形式规范的目标实现是协议设计中必不可少的阶段之一。
- Instance for use with SMTP to the credential cache and associates it with a host computer, port, and authentication protocol. 实例并将其与主机、端口和身份验证协议关联。
- The Kerberos authentication protocol is a security protocol that verifies data to help ensure that both user and network services are safe. Kerberos身份验证协议是一种安全协议,用于验证数据以帮助确保用户和网络服务均是安全的。
- In this paper, the application of LOTOS technology in network communication protocol design is studied. 本文对LOTOS技术在网络通信协议设计中的应用方法进行了研究。
- Kerberos is a authentication protocol based on KDC and symmetry key cryptography. It is used suitably in a physical insecurity network. Kerberos是基于可信第三方KDC使用对称密钥加密算法的认证协议,适合在一个物理网络并不安全的环境下使用。
- Based on the absolute distributed certificate authority almost any standard public-key-based authentication protocol could be adopted directly. 基于完全分布式的认证中心,可以直接采用几乎所有的标准公钥认证协议。
- It’s considered valuable to sup- port multiple security levels for broadcast authentication protocols in wireless sensor networks.A design of such protocols is also proposed. 初步探讨了无线传感器网络广播认证协议分级安全功能支持的意义,并给出了相应的方案设计思路。
- MySQL 4.1 and up uses an authentication protocol based on a password hashing algorithm that is incompatible with that used by older clients. 1及其后版本验证协议使用的密码哈希算法与老的客户端不兼容。
- Based on USB 1.1, the protocol design for LEX and REX is chiefly discussed, and the source code in Verilog and its simulation results are also given. 文章依据USB1.;1协议,重点讨论了LEX和REX端协议部分的设计,给出了用Verilog语言实现的源程序和仿真结果。