• NFC could supplant the QR code or the one-time-use PIN in ATM authentication protocols.

    NFC可以取代QR或者一次性使用密码这些ATM身份验证协议

    youdao

  • In the future they will support AD federation, WLID, etc as alternate authentication protocols.

    他们未来支持AD联盟、WLID作为备选认证协议

    youdao

  • The function of formal analysis in the design of the authentication protocols is discussed;

    探讨了形式化分析设计密码认证协议中的作用

    youdao

  • A Web site adopting OAuth as one of its authentication protocols will enhance the privacy and security for users.

    采用OAuth作为其中一身份验证协议Web站点增强用户隐私保护安全性。

    youdao

  • Simple authentication and Security layer (SASL) is an API that provides an abstraction layer for authentication protocols.

    简单身份验证安全(SASL)一种身份验证协议提供抽象层的API

    youdao

  • Informal methods for the analysis of cryptographic protocols especially authentication protocols are becoming more important in complicated modern communications.

    安全协议特别是认证协议非形式化分析复杂现代通信中变得尤其重要

    youdao

  • On the ground of deduction, the paper chose a more serials of public key authentication protocols to use the tool SPV for automatic verification, and got expected results.

    进行公理推导基础上,本文利用工具SPV更多公钥认证协议进行了自动化验证协议推导取得了一致的验证结果。

    youdao

  • In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation.

    该文按照协议分类分别概述几个具有代表性不可否认数据源认证协议,并对每一个协议的优缺点存在问题进行了讨论。

    youdao

  • There exist challenges in applying formal techniques to electronic contract signing protocols, which are not encountered in the analysis of key exchange and authentication protocols.

    密钥分发认证协议相比,电子合同签订协议形式化分析遇到了新的挑战

    youdao

  • This paper introduces three basic Quantum Cryptographic Protocols. There are BB84 Protocol, HBB Protocol and BF Protocol. And also discusses study of Quantum Authentication Protocols.

    该文主要介绍三个基本量子密码协议,即BB 84协议HBB协议BF协议,分析了量子身份认证协议研究现状。

    youdao

  • SSL protocols support authentication, data integrity, and confidentiality.

    SSL协议支持认证数据完整性机密性

    youdao

  • Both of these protocols are encrypted and use the operating systems method of authentication.

    这些协议都已经经过加密使用的是操作系统身份验证方法

    youdao

  • These protocols provide confidentiality, authentication and message integrity.

    这些协议提供机密性身份验证消息完整性

    youdao

  • To allow your Web service to work over various underlying protocols, make use of the WS-Security header for authentication, as it is passed with all protocols.

    使Web服务能够各种底层协议工作使用WS - Security进行认证,因为这个头可以所有的协议发送。

    youdao

  • Studying the protocols of broadcast authentication in sensor networks, and a protocol of broadcast authentication based multi-base in sensor networks is proposed.

    研究传感器网络中的广播认证协议给出一种针对多基站传感器网络广播认证协议

    youdao

  • Authentication, Authorization and Accounting (AAA) protocols such as TACACS and RADIUS were initially deployed to provide dial-up PPP and terminal server access.

    认证授权计费(AAA)协议TACACSRADIUS当初为了终端访问服务PPP拨号服务实行访问控制而开发的。

    youdao

  • It consists of the protocols of automatic key management, authentication and encryption.

    体系包括自动密钥管理认证加密协议

    youdao

  • TACACS is an encryption protocol and therefore less secure than the later TACACS + and Remote Authentication Dial-In User Service protocols.

    TACACS一个安全加密协议因此低于后来TACACS +远程认证拨号用户服务协议

    youdao

  • These security protocols used different authentication methods and encryption algorithm.

    这些安全协议使用不同认证方法加密算法

    youdao

  • In earlier version, authentication and key management protocol is called Privacy key management (PKM); and data protection protocols include two solutions based on DES-CBC and AES-CCM.

    早期规范中的认证密钥管理协议保密密钥,管理(PKM),数据保密机制包含基于DES -CBCAES - CCM的两个解决方案

    youdao

  • VPN cryptographical system is concerned with cryptographical technology, authentication technology and VPN implementation protocols.

    VPN密码系统的构建涉及几个方面的技术,包括加密技术、认证技术实现协议等

    youdao

  • The structure of the system, mail service protocols, mode of messaging, allocation of mailboxes as well as personal security for authentication and access control measures are discussed in this paper.

    文中论述系统结构邮递服务协议、邮递方式信箱的管理信件的保密存取控制手段等问题。

    youdao

  • In chapter 3, we have described the main protocols and methods in network authentication.

    第三系统地归纳并分析了网络身份认证技术中的主要协议基本方法

    youdao

  • MCPK-based security with routing protocols, OLSR neighbor detection stage by the introduction of secure authentication mechanisms to prevent wormhole attacks.

    采用基于MCPK安全路由协议通过在OLSR邻居探测阶段引入安全验证机制预防虫洞攻击

    youdao

  • MCPK-based security with routing protocols, OLSR neighbor detection stage by the introduction of secure authentication mechanisms to prevent wormhole attacks.

    采用基于MCPK安全路由协议通过在OLSR邻居探测阶段引入安全验证机制预防虫洞攻击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定