A full discussion of the nuances of common services — how they're started, how they react to client, inherent security issues and authentication methods — is beyond the scope of this document.
对常见服务之间细微差别的完整讨论-它们怎么启动、它们如何对客户机作出反应、其内在安全性问题和认证方法-已超出了本文的范围。
A document may be signed by handwriting, facsimile signature, perforated signature, stamp, symbol or any other mechanical or electronic method of authentication.
单据可以通过手签、签样印制、穿孔签字、盖章、符号表示的方式签署,也可以通过其它任何机械或电子证实的方法签署。
By trial and error, the attacker can check the various child nodes of the XML document and gather information by seeing if this XPath expression results in a successful authentication.
用试凑法,攻击者可以检查XML文档的各个子节点并通过查看这个XPath表达式是否能促成成功的身份验证以收集信息。
The JDBCSample was chosen for this document only because it's the only example of a full authentication provider.
本文档选用JDBCSample作为示例只是因为它是完整身份验证提供者的惟一示例。
This paper proposed a novel watermarking scheme for the authentication of business documents by embedding a piece of information in the binary document image.
针对商业文档的完整性保护问题,提出了一种数字水印方案。
This paper proposed a novel watermarking scheme for the authentication of business documents by embedding a piece of information in the binary document image.
针对商业文档的完整性保护问题,提出了一种数字水印方案。
应用推荐