NFC could supplant the QR code or the one-time-use PIN in ATM authentication protocols.
NFC可以取代QR码或者一次性使用密码这些ATM身份验证协议。
In the future they will support AD federation, WLID, etc as alternate authentication protocols.
他们会在未来支持AD联盟、WLID等以作为备选的认证协议。
The function of formal analysis in the design of the authentication protocols is discussed;
探讨了形式化分析在设计密码认证协议中的作用;
A Web site adopting OAuth as one of its authentication protocols will enhance the privacy and security for users.
采用OAuth作为其中一种身份验证协议的Web站点将增强用户的隐私保护和安全性。
Simple authentication and Security layer (SASL) is an API that provides an abstraction layer for authentication protocols.
简单身份验证和安全层(SASL)是一种为身份验证协议提供抽象层的API。
Informal methods for the analysis of cryptographic protocols especially authentication protocols are becoming more important in complicated modern communications.
安全协议特别是认证协议的非形式化分析在复杂的现代通信中变得尤其重要。
On the ground of deduction, the paper chose a more serials of public key authentication protocols to use the tool SPV for automatic verification, and got expected results.
在进行公理推导的基础上,本文还利用工具SPV对更多的公钥认证协议进行了自动化验证,与协议推导取得了一致的验证结果。
In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation.
该文按照协议分类分别概述了几个具有代表性的不可否认数据源认证协议,并对每一个协议的优缺点和存在问题进行了讨论。
There exist challenges in applying formal techniques to electronic contract signing protocols, which are not encountered in the analysis of key exchange and authentication protocols.
与密钥分发和认证协议相比,电子合同签订协议的形式化分析遇到了新的挑战。
This paper introduces three basic Quantum Cryptographic Protocols. There are BB84 Protocol, HBB Protocol and BF Protocol. And also discusses study of Quantum Authentication Protocols.
该文主要介绍三个基本的量子密码协议,即BB 84协议、HBB协议和BF协议,分析了量子身份认证协议的研究现状。
SSL protocols support authentication, data integrity, and confidentiality.
SSL协议支持认证、数据完整性和机密性。
Both of these protocols are encrypted and use the operating systems method of authentication.
这些协议都已经经过加密,使用的是操作系统身份验证方法。
These protocols provide confidentiality, authentication and message integrity.
这些协议提供机密性、身份验证和消息完整性。
To allow your Web service to work over various underlying protocols, make use of the WS-Security header for authentication, as it is passed with all protocols.
要使您的Web服务能够在各种底层协议上工作,请使用WS - Security头进行认证,因为这个头可以用所有的协议发送。
Studying the protocols of broadcast authentication in sensor networks, and a protocol of broadcast authentication based multi-base in sensor networks is proposed.
研究传感器网络中的广播认证协议,并给出一种针对多基站传感器网络的广播认证协议。
Authentication, Authorization and Accounting (AAA) protocols such as TACACS and RADIUS were initially deployed to provide dial-up PPP and terminal server access.
认证、授权和计费(AAA)协议,如TACACS和RADIUS,当初是为了对终端访问服务和PPP拨号服务实行访问控制而开发的。
It consists of the protocols of automatic key management, authentication and encryption.
该体系包括自动密钥管理、认证、加密协议。
TACACS is an encryption protocol and therefore less secure than the later TACACS + and Remote Authentication Dial-In User Service protocols.
TACACS是一个安全的加密协议,因此低于后来TACACS +和远程认证拨号用户服务协议。
These security protocols used different authentication methods and encryption algorithm.
这些安全协议使用不同的认证方法和加密算法。
In earlier version, authentication and key management protocol is called Privacy key management (PKM); and data protection protocols include two solutions based on DES-CBC and AES-CCM.
早期规范中的认证与密钥管理协议为保密密钥,管理(PKM),数据保密机制包含基于DES -CBC和AES - CCM的两个解决方案。
VPN cryptographical system is concerned with cryptographical technology, authentication technology and VPN implementation protocols.
VPN密码系统的构建涉及几个方面的技术,包括加密技术、认证技术、实现协议等。
The structure of the system, mail service protocols, mode of messaging, allocation of mailboxes as well as personal security for authentication and access control measures are discussed in this paper.
文中论述了该系统的结构、邮递服务协议、邮递方式、信箱的管理及信件的保密和存取控制手段等问题。
In chapter 3, we have described the main protocols and methods in network authentication.
第三章系统地归纳并分析了网络身份认证技术中的主要协议与基本方法。
MCPK-based security with routing protocols, OLSR neighbor detection stage by the introduction of secure authentication mechanisms to prevent wormhole attacks.
采用基于MCPK的安全路由协议,通过在OLSR邻居探测阶段引入安全验证机制来预防虫洞攻击。
MCPK-based security with routing protocols, OLSR neighbor detection stage by the introduction of secure authentication mechanisms to prevent wormhole attacks.
采用基于MCPK的安全路由协议,通过在OLSR邻居探测阶段引入安全验证机制来预防虫洞攻击。
应用推荐