本例中选用基本认证方式。
然后介绍了PK I环境下的认证方式。
许多建筑师都选择了NCARB提供的自愿认证方式。
Many architects opt for voluntary certification through NCARB.
当路由器配置了认证方式,就会鉴别路由信息的收发方。
When the router is configured with authentication, can identify routing information sending and receiving side.
提出了比较经济、可靠的分布式网络实体身份认证方式。
Bring upped the economic, credible resolvent for proving the status of object in network.
传统的保密与认证方式已经越来越难以保证认证的安全性。
Traditional security and authentication can not guarantee the safety of authentication.
Netflix的认证方式基于OAuthCore 1.0协议。
The Netflix authentication methods are based on the OAuth Core 1.0 protocol.
传统ERP软件分散的身份认证方式不利于企业信息平台的一体化建设。
The identity authentication mode of traditional erp is distributed, which goes against the construction of enterprise information framework.
注意:无论您使用何种用户认证方式,总能通过手工创建一个新用户帐号。
Note: you can always create new accounts manually, regardless of which authentication method you are using.
这种认证方式能让建筑师更容易取得美国54个州和地区委员会成员单位的互惠许可证。
This certification makes it easier for architects to obtain reciprocal licenses among the 54 U.S. states and jurisdictions that are members of the council.
生物识别技术认定的是人本身,没有什么能比这种认证方式更安全、更方便了。
Biometric technology is recognized by the people themselves, without any certification that way than more secure, more convenient.
智能卡的应用突破了传统的身份认证方式,为身份认证问题提供了一个更好的解决方案。
The application of intelligent card makes a breakthrough in traditional authentication mode, and provides a better solution project for identity authentication.
因此,研究开发一套能够支持不同的认证方式、单点登录的统一认证平台是很有必要的。
Therefore it is necessary for us to develop a unified authentication system to support different authentication ways and single sign-on.
这种认证方式能让建筑师更容易取得美国54个州和地区委员会成员单位的互惠许可证。
This certification makes it easier for architects to obtain reciprocal licenses among the 54 U. S. states and jurisdictions that are members of the council.
配置的最后一部分,包含在清单11 中,这部分指出了所需保护的资源以及所要采用的认证方式。
The final portion of the configuration, included in Listing 11, indicates which resources you would like to secure and what type of authentication you want to use.
控制方面的课题有:安全审计不足的可能,以及认证方式和安全度量在云计算中没有得到采用这样一个事实。
Among the control challenges are insufficient security audit possibilities, and the fact that certification schemes and security metrics aren't adopted to cloud computing.
在此潮流之下,传统的保密与认证方式,已难以应付日益复杂的电子交易和信息保密措施的需要。
Under this tide, traditional security ways have been no longer reliable to satisfy the need of complex behaviors of e-commerce and information security.
支持多认证方式的单点登录是目前的一个新需求,通常这又使认证协议的实现和跨域的认证更加复杂。
The requirement of supporting multiple authentication in single sign-on scheme often complicates the realization of authentication protocol and cross-realm authentication.
组件为用户提供了通行字认证方式、零知识认证方式、基于生物特征的认证方式和基于令牌的认证方式。
Four authentication modes is supported you can choose include mode based on password, mode based on zero knowledge proof, mode based on Biometrics and mode based on Token.
在SIP安全措施上,对传统的HTTP摘要认证方式作了改进,实现了双向身份认证和密钥协商的功能。
In SIP's security measure, the method of the traditional HTTP digest authentication is improved, and the functions of bidirectional identity authentication and key negotiation are supplied.
为实现更可靠以及定制化功能更强的认证处理,并获得更流畅的用户体验,您可能会选择基于表单的认证方式。
For more robust and customizable authentication handling and a smoother user experience, you might want to use form-based authentication instead.
在此潮流之下,传统的保密与认证方式如:识别码,已难以应付日益庞杂的电子交易与信息保密措施等的需求。
Traditional security ways, such as PIN code, are no longer reliable and difficult to satisfy the complex behaviors of e-commerce and information security.
一个新的全面的产品目录,包括每个电源的输出电压,电流,尺寸,UL认证方式,以及订单上的扫描条形码。
A new, full-size product catalog includes each unit's output voltage, amps, dimensions, ul Listing status, and a scannable bar code for quick order processing.
以某钢铁企业为背景,针对手工认证方式实时性差、精确度低的特点,设计并实现了一套计量数据自动认证系统。
This paper introduces the implementation method for establishing the metrological data transmission system based on Windows operating system and by using the dial-up network.
为了增强用户身份认证机制的安全性,在传统的口令认证方式的基础上,提出了一种基于模糊逻辑的击键特征用户认证方法。
In order to improve the security of the identity authentication and according to the conventional password authentication, a biometrics based on fuzzy logic for authentication is put forward.
虫洞攻击容易发动,很难被检测到,一般的加密认证方式不能防御虫洞攻击,需要在路由协议中有针对性添加特定的安全机制。
Encryption and authentication mechanism has no use to defend against wormhole attack. It is need to embed corresponding mechanism in routing protocol to guarantee security.
传统的身份认证只是一种用户名和口令的简单组合,在充满黑客和攻击的网络环境下,这种认证方式已经不能充分保证应用系统的安全。
Traditional ID authentication combines a user name and a password, which is not sufficient enough to assure the security of application systems in an environment full of hackers network attacks.
传统的身份认证只是一种用户名和口令的简单组合,在充满黑客和攻击的网络环境下,这种认证方式已经不能充分保证应用系统的安全。
Traditional ID authentication combines a user name and a password, which is not sufficient enough to assure the security of application systems in an environment full of hackers network attacks.
应用推荐