查询词典 authentication
- 与 authentication 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Based on Harn抯 digital signature scheme and zero-knowledge proof, an authentication access control scheme for information protection system is presented in this paper.
基于Harn数字签名方案和零知识证明,针对信息保护系统构造了一种认证存取控制方案。
-
The basic Diffie-Hellman key exchange scheme does not provide authentication. Harn proposed a digital signature scheme for Diffie-Hellman key exchange system.
本章第七节,对HMP方案,设计一种已知明文的伪造攻击方法,得出结论,当HMP方案的设计中所选用的单向函数是同态函数时这种方案是不安全的。
-
The supporting technologies of network information security are summarized. The unitive authentication systems existing are analyzed in this paper; their virtues and shortcomings are discussed.2. About the distributed peculiarities of allied resource, the concept of alliance grid is established. The access control model of alliance grid is established by directive ideas of access control security of alliance grid. AG-RBAC model is set up in the basic of common RBAC, interbedded relations between roles are set forth.
针对制造联盟企业资源分布式的特点,提出了联盟网格的概念;根据联盟网格安全访问控制的指导思想,提出了联盟网格访问控制模型;在一般RBAC模型的基础上提出了基于角色的联盟网格访问控制模型,清晰的表述了角色之间的层次关系;初步分析了AG-RBAC的实现模式,重点讨论了角色定义和权限配置的实现方法。
-
The system's enrollment and authentication algorithm, developed by Iridian Technologies, Inc., makes a template of the iris pattern for storage in a database or on an access credential.
由Iridian Technologies, Inc。,公司开发的该系统的注册和认证算法,使虹膜模式的模板能存储在数据库或通行证件中。
-
This model can ensure the safety of information authentication, and provides jointless transferring across distributed platforms.
首先分析了Kerberos和SAML两种主要的SSO模型,然后提出了一种Web环境下的联合SSO模型。
-
Upon the problems mentioned above, this paper focuses on the following work:? Analyzes the advantages and disadvantages for the key researches both in and abroad;? Studies some existing international standards and protocols including SET and ASC X9;? Gives the designing rules for the secure scheme then proposes a general simple model for mobile payment;? A secure scheme called SeMo is designed according to the different security needs for lineate links and wireless ones;? Analyzes the security for the scheme still basing on the two distinct links, which improves the scheme fully fulfilling the security requirements such as: authentication, integrity, confidentiality and non-repudiation.
针对上述问题,本文作了以下几点工作:●分析了国内外对移动支付研究的现有关键技术的优缺点;●学习了一些现有的国际金融规范和标准为准则;●借鉴安全电子交易模型方案,并参考了ASC的X9系列规范,提出一个简单可行的移动支付一般模型;●根据该模型尝试着根据无线和有线两个不同接口对安全性的需要,设计出移动支付系统的安全方案SeMo;●然后再根据接口的不同对该安全方案进行分析,证明该方案能解决移动支付的安全问题,也就是手持设备的认证问题以及数据保密性、完整性等问题。
-
Energy saving mansion in national scientific department has gained LEED golden authentication, presently monobloc quantity of TBA TOWER is the greatest one among architectures gaining LEED-CS golden pre-certification.
LEED认证是一个权威的第三方评估和认证体系,全球有2500多个项目都在实施认证,国家科技部节能示范楼已取得LEED金级认证, TBA TOWER是目前全世界取得LEED-CS金级预认证单体量最大的建筑。
-
Netop encrypts all data traffic with 256-bit AES, 2048-bit dynamic key exchange and supports leading authentication and authorization systems such as Smartcards, RSA Secure ID and Directory Services.
内托普加密所有的256位AES,2048位动态密钥交换数据传输,并支持领先的智能卡身份验证和授权系统,例如,RSA的安全ID和目录服务。
-
Nextly, we discuss how to integrate the application systems and the Uniform Identity Authentication System.
在应用集成中如何把统一身份认证平台和应用系统结合起来,将是另外一个必须要解决的问题。
-
About rights control, the system uses a new method of structure, distribution and authentication of the licence key, which prevent nonlicet and legal users from getting the licence key.
在版权控制上,该系统采用一种新的内容许可证密钥构造、分配和认证的方法,使机器指纹、用户个人信息和内容许可证绑定,从而保证不管非法用户还是授权用户都无法获知该内容许可证密钥。
- 推荐网络例句
-
And Pharaoh spoke to Joseph, saying, Your father and your brothers have come to you.
47:5 法老对约瑟说,你父亲和你弟兄们到你这里来了。
-
Additionally, the approximate flattening of surface strip using lines linking midpoints on perpendicular lines between geodesic curves and the unconditional extreme value method are discussed.
提出了用测地线方程、曲面上两点间短程线来计算膜结构曲面测地线的方法,同时,采用测地线间垂线的中点连线和用无约束极值法进行空间条状曲面近似展开的分析。
-
Hey Big Raven, The individual lies dont matter anymore - its ALL a tissue of lies in support of...
嘿大乌鸦,个别谎言的事不要再-其所有的组织的谎言,在支持。