... 物品特征信息识别article characteristic identification 钥匙的授权key authorization 误识false identification ...
基于66个网页-相关网页
The protocol USES such technologies as symmetrical key encryption, public key encryption, Hasche algorithm, digital signature as well as public key authorization mechanism and so on.
该协议采用的技术包括,对称密钥加密、公共密钥加密、哈希算法、数字签名技术以及公共密钥授权机制等。
The ability to produce — and manipulate — tables of this sort is a key capability for any authorization framework.
能够生成此类表并对这些表进行操作对于任何授权框架来说都是一项关键功能。
Thus, establishing robust identity management processes to achieve authentication and authorization is one of the key aspects to successfully compile a secure software solution.
因此,必须建立健壮的身份管理过程来实现身份验证和授权,这是成功实现安全的软件解决方案的关键因素之一。
应用推荐