The security mechanism behind the two pairs of keys is called the Open Authentication (OAuth) protocol (see Resources).
两对密钥背后的安全机制被称为开放式验证(OAuth)协议(见 参考资料)。
Kerberos is a security authentication protocol that requires users and services to provide proof of identity.
Kerberos是需要用户和服务提供标示证明的安全性认证协议。
The following are some of the different security mechanisms offered by Secure RPC protocol for the purpose of authentication.
下面是安全RPC协议出于身份验证目的所提供的一些不同的安全机制。
Kerberos is an authentication protocol that USES 'tickets' to verify the identity of a user in an unprotected network.
Kerberos是一种身份验证协议,它使用‘票据’验证未受保护的网络中的用户的身份。
Kerberos is an authentication protocol developed by the Massachusetts Institute of Technology.
Kerberos是由麻省理工学院开发的验证协议。
Kerberos essentially consists of a complex process called Kerberos authentication protocol (KAP).
Kerberos在本质上包含一个称为Kerberos身份验证协议(kap)的复杂过程。
Atom Publishing Protocol leverages the full use of XML (internationalization, extensible using XML Namespaces) and the full use of HTTP (all methods, authentication, URIs to identify resources).
AtomPublishingProtocol充分利用了XML(国际化,可使用XML名称空间扩展)和HTTP(所有的方法、身份验证、用uri标识资源)。
Along with authentication and in-transit data protection, XMPP can be applied at a variety of levels and is ideal as a middleware protocol.
通过结合身份验证和传输中的数据保护,XMPP可以应用在不同的层次,而且可以作为一个理想的中间件协议。
HttpClient does not support preemptive authentication out of the box, but you can use a protocol interceptor to preemptively introduce an AuthScheme instance to the execution context.
HttpClient不支持开箱即用的先占式认证,但是您可以使用一个协议拦截器事先引入一个AuthScheme实例到执行上下文。
OAuth does have signatures as part of its protocol, but I wanted something that was orthogonal to authentication as the client and server may not be using OAuth for authentication.
签名确实是OAuth协议的一部分,但我曾经希望与认证互相垂直的某些内容能作为客户端、而服务器可以不用OAuth进行认证。
Using authentication mechanisms outside of the SOAP envelope (such as passing a cookie around) introduces a dependency on a particular protocol (HTTP).
使用soap信封外的认证机制(比如来回传送cookie)就要依赖特定的协议(HTTP)。
A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.
一个安全的认证协议能有效抵御恶意的攻击者对通信网进行的欺诈,保证通信网的安全运行。
Kerberos is one such network authentication protocol that provides centralized authentication by storing the database of relevant data in a central repository known as a Key Distribution Center (KDC).
Kerberos正是这样的一种身份验证协议,它通过在称为密钥分发中心(KDC)的中央存储库中存储相关信息的数据库,从而提供集中式的身份验证。
Studying the protocols of broadcast authentication in sensor networks, and a protocol of broadcast authentication based multi-base in sensor networks is proposed.
研究传感器网络中的广播认证协议,并给出一种针对多基站传感器网络的广播认证协议。
Kerberos Tray is a graphical user interface tool that displays ticket information for a computer running Microsoft's implementation of the Kerberos V5 authentication protocol.
KerberosTray是一个图形用户界面工具,用于显示运行KerberosV5身份验证协议的Microsoft实现的计算机的相关票据信息。
Under the MSR framework, the definitions about secrecy and authentication are proposed3 Protocol model and intruder model is improved to solve the infinite state of intruder model.
在MSR框架结构下定义了密码协议的秘密性和认证性。3改进了协议模型和攻击者模型,主要解决了攻击者模型中出现的无限循环状态。
This paper introduces three basic Quantum Cryptographic Protocols. There are BB84 Protocol, HBB Protocol and BF Protocol. And also discusses study of Quantum Authentication Protocols.
该文主要介绍三个基本的量子密码协议,即BB 84协议、HBB协议和BF协议,分析了量子身份认证协议的研究现状。
This protocol can realize mutual authentication and generate a session key acknowledged by both sides of communication. Besides, the generation of session key has no third party involved.
该协议可以实现通信双方的相互认证,同时产生双方认可的会话密钥,并且会话密钥的产生不需要其他第三方的参与。
The method of modularize design of protocol authentication system is a new idea of implementing the standardization, modularize and high network safety of network manage system.
模块化的协议认证系统的设计思想是有效实现网络管理系统标准化、模块化和提高网络系统安全性的新思路。
In connection with the requirements on personal communications, an implementation of an authentication and key agreement protocol based on public key cryptosystem is given.
本文针对个人通信系统的需求,给出一种基于公钥体系的认证和密钥约定协议的实现方案。
Secure identity authentication protocol is the kernel of authentication system.
安全可靠的身份认证协议是认证系统的核心。
Then the formalized security proof of the protocol using BAN authentication logic, and the qualitative analysis about its computing complexity are given.
并采用BAN认证逻辑对协议的安全性进行了形式化证明,也对协议的计算复杂性进行了定性分析。
This paper mainly focuses on key exchange protocol based on dynamic password authentication, which can insure the security of both authentication and transportation of VPN system.
本文主要研究基于动态口令认证的密钥交换协议,该协议既能保证VPN的认证安全,又能保证VPN的传输安全。
A protocol of electronic election based on elliptic curve is proposed. The digital signature based on elliptic curve is used in this protocol. It provides the identity authentication and encryption.
提出了一个基于椭圆曲线的电子选举协议,该协议中多次用到基于椭圆曲线的数字签名,不仅达到了相应的身份认证,同时达到了加密的作用。
An authentication protocol of mobile user is analyzed, and the anonymity problem in which is presented Finally, the improved protocol with anonymous characteristic is proposed.
本文分析了一种移动用户的认证协议,讨论了其存在的匿名问题并提出了一种具有匿名特征的移动用户认证协议。
The system USES a dual-factor authentication method and a digital certificate authentication protocol during the process of authentication, which strengthens the security of the system effectively.
在认证过程中,本系统采用双因素认证方法和数字证书强认证协议,有效增强系统的安全性。
On the research of the whole access identity authentication, including protocol, client and server, the frame of authentication system in which has been put forward.
并以借此研究了整个接入用户身份认证系统,包括认证协议、认证客户端、认证服务器端,提出了园区网络认证系统的整体框架。
Using information dispersal algorithm we propose a new multicast authentication protocol on the base of research in TESLA which can provide authentication for multicast in lossy channels.
在组播认证协议TESLA的基础上引入消息分散算法,提出一个全新的组播认证协议,它能够为不稳定信道上的组播通信提供实时认证。
The requirement of supporting multiple authentication in single sign-on scheme often complicates the realization of authentication protocol and cross-realm authentication.
支持多认证方式的单点登录是目前的一个新需求,通常这又使认证协议的实现和跨域的认证更加复杂。
The requirement of supporting multiple authentication in single sign-on scheme often complicates the realization of authentication protocol and cross-realm authentication.
支持多认证方式的单点登录是目前的一个新需求,通常这又使认证协议的实现和跨域的认证更加复杂。
应用推荐