This paper has designed the new broadcast authentication technology which is suitable for WSN.
本文设计了适用于广播频繁的传感器网络的广播消息认证技术。
This paper introduces the structure and working principle of 802.1X authentication technology system.
介绍了802。1X认证技术的体系结构和工作原理,分析了802。
The combination with the technology of the computer, make biological authentication technology widely used in a lot of fields.
与计算机技术的结合,使得生物验证技术在许多领域得到了广泛的应用。
Electron signature seal, as modern authentication technology, guarantees for its rapid transmission and security of information.
作为现代认证技术的电子签名印章,为其快速传送信息和确保信息安全提供了重要保障。
Specifically, applications write to the LoginContext API, while authentication technology providers write to the LoginModule interface.
特别是,应用程序写到LoginContextAPI,而认证技术提供程序则写到LoginModule 接口。
VPN cryptographical system is concerned with cryptographical technology, authentication technology and VPN implementation protocols.
VPN密码系统的构建涉及几个方面的技术,包括加密技术、认证技术、实现协议等。
Secure authentication technology is a most important application way. It's one of typic technology in information secure field, too.
安全认证是密码学的重要应用方向,也是信息安全领域中常用的技术之一。
The identity authentication technology that can authenticate the identity of the sender and the receiver is very important in the security system.
身份认证技术是能够对信息收发方进行真实身份鉴别的技术,是保护网络信息资源安全的第一道大门。
In the information security, the status authentication technology holds the extremely important status, is the information security system first checkpoint.
在信息安全中,身份认证技术据有极其主要的位置,是信息安全体系的第一个关卡。
As a novel biometric authentication technology, human ear recognition needs to solve the problems of image processing such as edge detection and feature extraction.
人耳识别作为新的生物特征识别技术,首先要解决作为基础的边缘检测和特征提取等图像处理方面的问题。
This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.
本文描述AT M网络中的信息安全、可能受到的威胁、安全结构和端系统之间的鉴别技术。
Authentication problems are probably the most pervasive class of security problems if we ignore software bugs, meaning that choosing a reasonable authentication technology is important.
如果我们忽略软件错误,认证问题可能是最普遍类型的安全性问题,这意味着选择一个合理的认证技术很重要。
Digital library is research hotspot now in computer fields. This paper presents system integration and authentication technology based on Net library Among the Universities in Shanghai.
数字图书馆是当前计算机界研究的一个热点,本文以“上海市高校网络图书馆”为背景,介绍网络图书馆中所采用的系统集成技术和安全认证技术。
The article finally partially analyzed has put forward in the plan some deficiency, and has made the forecast to the future unified status authentication technology development tendency.
文章的最后部分分析了所提方案中的一些不足之处,并对未来的统一身份认证技术的发展趋势作出了展望。
While the identity authentication technology are network security and information system security the first barrier, it is time network information security technology a very important research field.
而身份认证技术是网络安全和信息系统安全的第一道屏障,它是网络时代信息安全技术非常重要的一个研究领域。
In particular, the variety authentication models and technology choices for leveraging these services deserve your attention.
特别需要指出的是,您应该注意一下利用这些服务的各种认证模型与技术选择。
Biometric authentication is a convenient technology, because people can't really forget their authentication information like a password or lose it like a physical token.
生物认证是一种方便的技术,因为人们不会象忘记密码或象丢失物理标记那样真正忘记他们的认证信息。
For example, if no authentication or authorization of service requests is required, the choice of technology can be very broad.
例如,如果服务请求不需要提供身份验证或授权,实现技术的选择就可以非常的广泛。
It then describes how you can achieve authentication based on public key technology, using the new GSS-API security mechanisms with the customizable DB2 UDB security plug-ins.
然后还将描述:如何通过使用新的具有可定制的DB 2UDB安全插件的GSS - API安全机制来实现基于公钥技术的身份验证。
OpenID technology provides a decentralized authentication model enabling Internet single sign-on (SSO).
OpenID技术提供一个分散的身份验证模型,支持因特网单点登录(singlesign-on,SSO)。
There are various authentication methods in UNIX systems, like password-based authentication, authentication using smart CARDS, authentication based on biometric technology, and more being practiced.
在UNIX系统中,有多种身份验证方法,比如基于密码的身份验证、使用智能卡的身份验证、基于生物检测技术的身份验证等等。
This technology is a new authentication technique, and it's an algorithm based on the identity technology.
组合公钥技术是一种新的认证技术,它是基于标识的公钥算法技术。
This article teaches you how the Technology Explorer can control user and group authentication to db2 through the use of a security plug-in called db2auth (see Resources for more about db2auth).
本文将向您介绍如何在TechnologyExplorer中使用db2auth安全插件来控制db2的用户和组身份验证(参见参考资料了解db2auth的详细信息)。
This technology has reduced the calculation intensity, improved the speed of authentication.
该技术降低了节点的计算强度,提高了广播认证速度。
Kerberos is an authentication protocol developed by the Massachusetts Institute of Technology.
Kerberos是由麻省理工学院开发的验证协议。
As a result, StrongPoint provides impenetrable authentication using Uniloc's Physical Device Recognition (PDR) technology to grant access to authorized systems and communications networks.
结果,StrongPoint利用Uniloc公司的物理硬件识别(PDR)为授权系统和通信网络提供了严密的认证。
As a result StrongPoint provides impenetrable authentication using Uniloc's Physical Device Recognition (PDR) technology to grant access to authorized systems and communications networks.
结果,StrongPoint利用Uniloc公司的物理硬件识别(PDR)为授权系统和通信网络提供了严密的认证。
The interoperation technology about IP telephony is very concerned now. Some aspects, such as call handling procedures, authentication and authorization procedures, are discussed in this paper.
IP电话的互通问题是目前许多人关注的问题,文章就其中的呼叫控制流程和用户接入认证协议进行了讨论。
The unified authentication system using this authentication scheme builds up the secure authentication frame of National Fundamental Resources Platform of Science and Technology.
采用本方案建立起来的统一身份认证系统为国家科技基础条件平台的建设提供了安全认证框架。
The unified authentication system using this authentication scheme builds up the secure authentication frame of National Fundamental Resources Platform of Science and Technology.
采用本方案建立起来的统一身份认证系统为国家科技基础条件平台的建设提供了安全认证框架。
应用推荐