• Kerberos was designed based on secret key cryptography and using trusted third party authentication.

    Kerberos根据秘密密钥加密使用可信第三身份验证而设计的。

    youdao

  • In contrast, of course, WebSphere Application Server is trusted to handle LDAP, ActiveDirectory, Kerberos, and many third party authentication providers.

    当然,与此相对WebSphereApplicationServer可以处理LDAPActiveDirectoryKerberos很多第三身份验证提供程序

    youdao

  • This paper presents a trusted third party authentication architecture in which hand shapes verification techniques and cryptography techniques are combined.

    该文提出了一种包含可信任第三的网络认证结构结合了手认证技术加密技术。

    youdao

  • This paper presents a trusted third party authentication architecture in which hand shapes verification techniques and cryptography techniques are combined.

    该文提出了一种包含可信任第三的网络认证结构结合了手认证技术加密技术。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定