The extensible authentication protocol (EAP) is investigated and the authentication procedure is discussed comprehensively.
重点研究了可扩展认证协议EAP,对EAP的认证过程做了比较全面地探讨。
Because entering many characters is cumbersome with smartphone keypads, this option greatly improves the authentication procedure.
由于使用智能手机键盘输入大量字符非常繁琐,因此这个选项极大地改善了身份验证过程。
To reduce the handoff delay, this paper proposed a mechanism which combined the context transfer protocol and authentication procedure.
为了降低切换时延,提出把上下文传输协议和认证过程结合起来的机制。
The third part is about the consequences of invalid labor contract, and it is divided as the authentication procedure and law consequences.
第三部分为无效劳动合同的法律后果,分为无效劳动合同的确认程序和无效劳动合同的法律后果两个方面。
Of course, you should plan a good password policy and implement an authentication procedure that fits your required security level in your corporation.
当然,你可以通过良好的密码策略和执行验证程序在公司中配备适当的安全级别。
And strictly according to the LSO9000 authentication procedure production, the year productivity surpasses 3,000,000 steel cylinders, the quality qualified rate 100%.
并严格按照ISO 9000认证的程序生产,年生产量超过300万只钢瓶,质量合格率100%。
Misunderstanding: SAML defines a discovery procedure to find authentication authorities
误解:SAML定义了发现过程以查找认证权威机构。
Name of the stored procedure for group authentication.
用于组身份验证的存储过程的名称。
Name of the stored procedure for user authentication.
用于用户身份验证的存储过程的名称。
Meanwhile security procedure whose relevant norms allocates the losses arising out of fraud among the parties serves as the authentication means of payment order.
安全程序是支付命令的认证手段,其相关规则将欺诈损失在各当事方间进行了分担。
The shortcomings to 3G Authentication and Key Agreement(AKA) protocol were described through analyzing its procedure and security.
分析了3G认证与密钥协商协议(AKA)的过程和特点,指出了存在的缺陷,提出了一种新的AKA改进方案。
This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.
详细分析了UMTS认证和密钥分配协议的过程以及协议的安全性,找出协议中存在的弱点和可能的攻击,提出了公钥加密协议的改进方法。
One way is what is called two-channel authentication, using something other than the computer - most likely a cellphone - as part of the log-on procedure.
一种方法是所谓的双通道验证,使用的不是电脑-最有可能是手机-作为登录程序。
In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.
本文分析了IMS认证与密钥分配协议的过程,找出了认证协议中的安全缺陷,并给出了攻击者可能进行的攻击。
Judicial proof authentication at court is a litigation procedure during which judges attest the truth of the case at court.
法官当庭认证是法官当庭认证案件事实的一种诉讼活动。
Also, if your account USES an external authentication mean (LDAP), this procedure isn't be available.
同样,如果你的账户使用了而外的授权(LDAP),这个程序也是不可用的。
Abstract: Judicial proof authentication at court is a litigation procedure during which judges attest the truth of the case at court.
文摘:法官当庭认证是法官当庭认证案件事实的一种诉讼活动。
Abstract: Judicial proof authentication at court is a litigation procedure during which judges attest the truth of the case at court.
文摘:法官当庭认证是法官当庭认证案件事实的一种诉讼活动。
应用推荐