SAML是一个在服务器之间使用的认证协议。
SAML is an authentication protocol that is used between servers.
是一种基于密码的强认证协议。
Secure Remote Password (SRP) protocol is a strong network authentication mechanism.
安全可靠的身份认证协议是认证系统的核心。
Secure identity authentication protocol is the kernel of authentication system.
文中提出了一个基于门限思想的身份认证协议。
In this paper, a user identification scheme based on threshold idea is proposed.
提出了一种高效的具有用户匿名性的无线认证协议。
This paper presents a new simple and efficient wireless authentication protocol providing user anonymity.
设计了一种基于指纹加密技术的网络身份认证协议。
The contents of the paper are listed as follow:1. Design an authentication protocol based on fingerprint encryption.
他们会在未来支持AD联盟、WLID等以作为备选的认证协议。
In the future they will support AD federation, WLID, etc as alternate authentication protocols.
本文提出一种基于椭圆曲线密码体制的3g认证协议。
A 3g authentication protocol based-on the elliptic curve cryptosystem is presented in this article.
Kerberos是需要用户和服务提供标示证明的安全性认证协议。
Kerberos is a security authentication protocol that requires users and services to provide proof of identity.
用户认证协议:该协议从服务器到客户端进行身份验证,且通过传输层运行。
User Authentication protocol: This protocol authenticates the client to the server and runs over the transport layer.
KDC服务允许用户使用KerberosV 5认证协议登录到网络上。
The KDC service enables users to log on to the network using the Kerberos V5 authentication protocol.
第二章提出采用JAAS技术,使用多种机制双向认证的集中式认证协议。
The second chapter proposes a centralized authentication protocol based on JAAS technology.
连接协议:该协议多路传输加密隧道到多个逻辑通道,通过用户认证协议运行。
Connection protocol: This protocol multiplexes the encrypted tunnel to numerous logical channels, running over the User Authentication protocol.
假如您已经签署了最新的认证协议,系统会显示提示,不会要求您重新签署。
If you have already signed the latest version of the Certification Agreement the system will display this notice and will not require you to sign this again.
安全协议特别是认证协议的非形式化分析在复杂的现代通信中变得尤其重要。
Informal methods for the analysis of cryptographic protocols especially authentication protocols are becoming more important in complicated modern communications.
与密钥分发和认证协议相比,电子合同签订协议的形式化分析遇到了新的挑战。
There exist challenges in applying formal techniques to electronic contract signing protocols, which are not encountered in the analysis of key exchange and authentication protocols.
重点研究了可扩展认证协议EAP,对EAP的认证过程做了比较全面地探讨。
The extensible authentication protocol (EAP) is investigated and the authentication procedure is discussed comprehensively.
Kerberos是一种网络认证协议,最初由MIT开发,使用对称密匙实现相互认证。
Kerberos is a network authentication protocol originally developed by MIT that provides mutual authentication using symmetric keys.
基于完全零知识交互证明系统和位委托方案,提出了可证明的安全水印认证协议。
A proved secure protocol for watermark verification based on perfect zero knowledge interactive proof system and bit commitments scheme is proposed.
在开始准备认证之前,查看IBM的认证策略和认证协议,确保理解并认同这些内容。
Before committing to certification, review IBM's certification policies and the certification Agreement to ensure you understand and feel comfortable with them.
本文研究了认证领域的相关问题,对常见认证协议的原理及其安全性进行了深入分析。
This thesis mainly concerns about certification related issues, giving some introduction and analyzation on several well known certification protocols.
研究传感器网络中的广播认证协议,并给出一种针对多基站传感器网络的广播认证协议。
Studying the protocols of broadcast authentication in sensor networks, and a protocol of broadcast authentication based multi-base in sensor networks is proposed.
相应的安全性分析明确给出了考虑这三种攻击时,改进的认证协议比以前的协议更加强健。
The security analyses show that the improved authentication protocol is much stronger against these three kinds of attacks than the traditional protocol.
本文提出面向消息中间件的分布式认证协议,给出协议内容、形式化描述以及安全性分析。
This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.
为提高制造网格环境下认证协议的安全性和性能,构建了标准模型下基于身份的认证协议。
To improve the security and performance of the authentification protocol in manufacturing grid, identity-based authentification protocols without random oracles were established.
一个安全的认证协议能有效抵御恶意的攻击者对通信网进行的欺诈,保证通信网的安全运行。
A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.
在认证过程中,本系统采用双因素认证方法和数字证书强认证协议,有效增强系统的安全性。
The system USES a dual-factor authentication method and a digital certificate authentication protocol during the process of authentication, which strengthens the security of the system effectively.
支持多认证方式的单点登录是目前的一个新需求,通常这又使认证协议的实现和跨域的认证更加复杂。
The requirement of supporting multiple authentication in single sign-on scheme often complicates the realization of authentication protocol and cross-realm authentication.
探讨了SSH协议体系结构,介绍ssh三个层次:传输层协议、用户认证协议、连接协议和密钥机制。
It probes into the structure of SSH protocol system and discusses the three different levels of SSH, namely transport layer protocol, user authentication protocol and connection protocol.
探讨了SSH协议体系结构,介绍ssh三个层次:传输层协议、用户认证协议、连接协议和密钥机制。
It probes into the structure of SSH protocol system and discusses the three different levels of SSH, namely transport layer protocol, user authentication protocol and connection protocol.
应用推荐