查询词典 authentication
- 与 authentication 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
This scheme has many merits: freely choosing and changing passwords; providing mutual authentication; resisting message replaying attack and insider attack; having strong security reparability; withstanding parallel session attack and remote system attack.
该方案允许用户自主选择并更改口令,实现了双向认证;能够抵御重放攻击、内部攻击,具备强安全修复性;能够抵御并行会话攻击和伪造远程主机攻击。
-
NHRA has many merits: it let users freely choose and change password at their own will; it provides mutual authentication between two entities; it has more lower computational costs; it resists masquerading remote system or legitimate user attack; in addition, it can detect fast when user inputs wrong password and give the correct indication of the reason; Furthermore, it has strong security reparability.
该方案允许用户自主选择和更改口令,实现了双向认证,有更小的计算开销;能够抵御假冒远程主机攻击、抵御假冒合法用户攻击;能够迅速检测口令输入错误及正确判断认证失败原因;具备强安全修复性。
-
This authentication method requires support for reversibly encrypted passwords—which is a bad idea.
此身份验证方法需要支持可逆加密的密码,这是一个坏主意。
-
MD4 and f RIPEMD.and used the two of the fortieth power Hash operates under any initial value to give the collision of the SHA-0 This means that the algorithms of security authentication extensively applied currently in the electronic commerce,bank system,and slock system tumblingly breaks down,which is the field of Hash function analysis.
这意味着目前广泛应用于电子商务、银行系统、证卷系统的安全认证算法??Hash函数分析领域堡垒的轰然倒塌。面对严峻而残酷的现实,依赖于Hash算法的银证系统数据安全传输问题,也就成为人们不得不及时解决的实际问题。
-
DNA barcoding has become a hotspot of taxonomical studies and may be a renaissance of authentication of medicinal plants.
文摘: DNA条形码是近年来生物分类和鉴定的研究热点和方向,其在药用植物鉴定中的成功应用将可能是生药鉴定方法的革命性突破。
-
Bases can be provided for forensic medicine authentication and medical prevention and treatment by observing big rats' tectological changes caused by the injuries from inhaling crude oil fume and gas fume.
观察大鼠吸入原油蒸气和汽油蒸气对器官损害的组织形态学变化,可为法医学鉴定和医学的防治提供依据。
-
The main features of this paper is: nothing to do with the platform, this system can be compatible with the majority of software and hardware used by the platform, as well as various database platform, shielding the differences of hardware and software platform such as network, operating systems, databases, application systems and so on, so that enterprises and institutions could achieve seamless, transparent data exchange through data exchange system; Java technology used to develop the system transplantability; using data exchange center to achieve centralized data processing, different data format conversion, increased system scalability; from data transmission, authentication, access control, encryption and more news content log-class areas enhanced data exchange system security; using DES and RSA algorithm , increased the confidentiality of data transmission; create WrapperTimer category achieved data transmission timing implementation and reduce the dependence on artificial.
设计的系统与平台无关,能兼容企业所用的大多数软硬件平台,以及各种数据库平台,屏蔽网络、操作系统、数据库、应用系统等软硬平台的差异,使企事业单位通过数据交换系统实现无缝的、透明的交换数据;采用数据交换中心来实现数据的集中处理、不同数据格式的转换,增加了系统的可扩展性;从数据传输、身份认证、权限控制、消息内容加密和多级日志等多方面增强数据交换系统的安全性;用DES和RSA算法对XML文件或XML文件中的元素进行加密,增加传输数据的保密性;创建WrapperTimer类实现了数据传输的定时执行,降低了对人工的依赖性。
-
Secure authentication technology is a most important application way. It's one of typic technology in information secure field, too.
安全认证是密码学的重要应用方向,也是信息安全领域中常用的技术之一。
-
In order to prevent unauthenticated users access Mesh Networks, it must define a suit of comprehensive authentication mechanism.
为了防止未认证用户访问Mesh网络,必须定义一套健全的认证机制。
-
If the switch already authorized a port by using MAC authentication bypass and detects an IEEE 802.1x supplicant, the switch does not unauthorize the client connected to the port.
使用基于mac地址的免认证特性的某个端口,如果已经通过了服务器的认证授权之后,又出现了一个具有IEEE 802.1x认证能力的客户端,则交换机会拒绝该客户端连接网络。
- 推荐网络例句
-
And Pharaoh spoke to Joseph, saying, Your father and your brothers have come to you.
47:5 法老对约瑟说,你父亲和你弟兄们到你这里来了。
-
Additionally, the approximate flattening of surface strip using lines linking midpoints on perpendicular lines between geodesic curves and the unconditional extreme value method are discussed.
提出了用测地线方程、曲面上两点间短程线来计算膜结构曲面测地线的方法,同时,采用测地线间垂线的中点连线和用无约束极值法进行空间条状曲面近似展开的分析。
-
Hey Big Raven, The individual lies dont matter anymore - its ALL a tissue of lies in support of...
嘿大乌鸦,个别谎言的事不要再-其所有的组织的谎言,在支持。