• The extensible authentication protocol (EAP) is investigated and the authentication procedure is discussed comprehensively.

    重点研究可扩展认证协议EAP,对EAP的认证过程做了比较全面地探讨。

    youdao

  • Because entering many characters is cumbersome with smartphone keypads, this option greatly improves the authentication procedure.

    由于使用智能手机键盘输入大量字符非常繁琐,因此这个选项极大地改善了身份验证过程。

    youdao

  • To reduce the handoff delay, this paper proposed a mechanism which combined the context transfer protocol and authentication procedure.

    为了降低切换时延提出上下文传输协议认证过程结合起来机制

    youdao

  • The third part is about the consequences of invalid labor contract, and it is divided as the authentication procedure and law consequences.

    第三部分无效劳动合同法律后果分为无效劳动合同确认程序无效劳动合同的法律后果两个方面。

    youdao

  • Of course, you should plan a good password policy and implement an authentication procedure that fits your required security level in your corporation.

    当然可以通过良好密码策略执行验证程序公司配备适当安全级别

    youdao

  • And strictly according to the LSO9000 authentication procedure production, the year productivity surpasses 3,000,000 steel cylinders, the quality qualified rate 100%.

    严格按照ISO 9000认证程序生产生产量超过300万只钢瓶质量合格率100%。

    youdao

  • Misunderstanding: SAML defines a discovery procedure to find authentication authorities

    误解SAML定义发现过程查找认证权威机构。

    youdao

  • Name of the stored procedure for group authentication.

    用于身份验证存储过程名称

    youdao

  • Name of the stored procedure for user authentication.

    用于用户身份验证存储过程名称

    youdao

  • Meanwhile security procedure whose relevant norms allocates the losses arising out of fraud among the parties serves as the authentication means of payment order.

    安全程序支付命令认证手段相关规则欺诈损失各当事方进行了分担。

    youdao

  • The shortcomings to 3G Authentication and Key Agreement(AKA) protocol were described through analyzing its procedure and security.

    分析3G认证密钥协商协议AKA)的过程和特点,指出了存在的缺陷,提出了一种新的AKA改进方案

    youdao

  • This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.

    详细分析了UMTS认证密钥分配协议过程以及协议的安全性,找出协议中存在弱点可能攻击,提出了公钥加密协议的改进方法。

    youdao

  • One way is what is called two-channel authentication, using something other than the computer - most likely a cellphone - as part of the log-on procedure.

    一种方法所谓双通道验证使用不是电脑-最有可能手机-作为登录程序

    youdao

  • In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.

    本文分析IMS认证密钥分配协议过程,找出认证协议中的安全缺陷,给出了攻击者可能进行的攻击。

    youdao

  • Judicial proof authentication at court is a litigation procedure during which judges attest the truth of the case at court.

    法官当庭认证法官当庭认证案件事实一种诉讼活动。

    youdao

  • Also, if your account USES an external authentication mean (LDAP), this procedure isn't be available.

    同样如果账户使用而外的授权(LDAP),这个程序也是不可用的。

    youdao

  • Abstract: Judicial proof authentication at court is a litigation procedure during which judges attest the truth of the case at court.

    文摘法官当庭认证法官当庭认证案件事实一种诉讼活动。

    youdao

  • Abstract: Judicial proof authentication at court is a litigation procedure during which judges attest the truth of the case at court.

    文摘法官当庭认证法官当庭认证案件事实一种诉讼活动。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定