英语人>网络例句>authentication 相关的网络例句
authentication相关的网络例句

查询词典 authentication

与 authentication 相关的网络例句 [注:此内容来源于网络,仅供参考]

Either way, you get truly valuable experience getting hands-on work with ISDN, especially watching PAP and CHAP debugs and understanding the authentication process.

不论如何,你会得到宝贵的经验,真正体验与ISDN的工作,尤其看着章隐含;70、认证和理解的过程。

With the rapid development of Internet, the problem of network security becomes more and more important How to construct a secure network is an important subject The technologies of firewall, cryptography, identity authentication are indispensable but passive in defensing against network attacks.

随着Internet的迅速发展,特别是随着政府上网工程的启动,网络安全问题越来越受到重视。

In part of the AAA, the application of information encrypts and authentication about users identity can resolve the above problem.

在数据的网络传输部分,本文采用AAA机制,进行了信息加密、用户身份认证等安全措施的应用,加密算法采用了国际流行的DES标准。

Creative point 3. Engrafting fuzzy recognition theory with information security theory, on the basis of elliptic curve cryptographic algorithm in information security theory, this paper presents t'-order iteration encryption, t-order iteration decryption algorithm of fuzzy recognition and authentication.

创新点3。将模糊识别理论与信息安全理论相互嫁接,相互交叉,以信息安全理论中的椭圆曲线加密算法为依据,提出模糊识别的t-阶迭代加密,t-阶迭代解密算法和对加密者的认证。

To combine identity authentication technique based on biometrics with encryption organically can make use of the uniqueness and indispensability of biometrics to assure information security, eradicates completely the phenomenon that the password be forgotten, robbed and cracked.

将生物特征身份认证技术和加密机制有机地结合在一起,可以利用生物特征的唯一性、不可替代性保证信息安全的长期有效,彻底杜绝密码和密钥遗忘、被盗、被破解的现象。

Currently, the federated authentication in distributed environment is becoming more and more important.

目前,分布式环境中的联合身份认证越来越突显其重要性。

Based on the existing grid security architecture, gives a kind of Grid Security and Trust Architecture inosculating trust management, identity authentication, authorization management, resource management and safety monitoring and audit system.

在研究分析现有网格安全体系结构模型的基础上,给出了一种融合信任管理、身份认证、授权管理、资源管理和安全监控审计的网格安全信任体系架构。

Such a strong technological innovation group laid a rather firm base for its bright future and inspirits the staff to go forw-ard. Thus the company devotes to develop new products to meet the ever-changing requirement of the market on the basis of its environmental frie-ndly authentication.

强大的技术创新能力是公司立足于未来的希望和动力,公司已获得环保认证,在此基础上不断开发满足于市场需求的新产品。

Message authentication – No. What will happen if Eve intercepts the public key and instead sends her own?

消息身份验证-第会发生什么,如果除夕截获公共密钥和发送,而不是她自己?

A new authentication protocol based on 3G-WLAN interworking networks is proposed.

提出了基于无线局域网和3G互联网络的接入认证协议。

第42/54页 首页 < ... 38 39 40 41 42 43 44 45 46 ... > 尾页
推荐网络例句

And Pharaoh spoke to Joseph, saying, Your father and your brothers have come to you.

47:5 法老对约瑟说,你父亲和你弟兄们到你这里来了。

Additionally, the approximate flattening of surface strip using lines linking midpoints on perpendicular lines between geodesic curves and the unconditional extreme value method are discussed.

提出了用测地线方程、曲面上两点间短程线来计算膜结构曲面测地线的方法,同时,采用测地线间垂线的中点连线和用无约束极值法进行空间条状曲面近似展开的分析。

Hey Big Raven, The individual lies dont matter anymore - its ALL a tissue of lies in support of...

嘿大乌鸦,个别谎言的事不要再-其所有的组织的谎言,在支持。