Kerberos is a security authentication protocol that requires users and services to provide proof of identity.
Kerberos是需要用户和服务提供标示证明的安全性认证协议。
The security mechanism behind the two pairs of keys is called the Open Authentication (OAuth) protocol (see Resources).
两对密钥背后的安全机制被称为开放式验证(OAuth)协议(见 参考资料)。
Security Assertion Markup Language (SAML) is a protocol to transport authentication and authorization information in an XML message.
安全性认定标记语言(Security Assertion Markup Language (saml))是以xml消息传输认证和授权信息的协议。
The following are some of the different security mechanisms offered by Secure RPC protocol for the purpose of authentication.
下面是安全RPC协议出于身份验证目的所提供的一些不同的安全机制。
A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.
一个安全的认证协议能有效抵御恶意的攻击者对通信网进行的欺诈,保证通信网的安全运行。
If you are using a protocol that is stateless and authenticates on every request (such as WS-security with UserNameTokens), this can generate heavy registry authentication traffic.
如果使用每个请求都要求身份验证的无状态协议(比如使用UserNameTokens的WS - security),这会产生很大的注册表身份验证通信流。
The security analyses show that the improved authentication protocol is much stronger against these three kinds of attacks than the traditional protocol.
相应的安全性分析明确给出了考虑这三种攻击时,改进的认证协议比以前的协议更加强健。
This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.
本文提出面向消息中间件的分布式认证协议,给出协议内容、形式化描述以及安全性分析。
Then the formalized security proof of the protocol using BAN authentication logic, and the qualitative analysis about its computing complexity are given.
并采用BAN认证逻辑对协议的安全性进行了形式化证明,也对协议的计算复杂性进行了定性分析。
This paper mainly focuses on key exchange protocol based on dynamic password authentication, which can insure the security of both authentication and transportation of VPN system.
本文主要研究基于动态口令认证的密钥交换协议,该协议既能保证VPN的认证安全,又能保证VPN的传输安全。
The system USES a dual-factor authentication method and a digital certificate authentication protocol during the process of authentication, which strengthens the security of the system effectively.
在认证过程中,本系统采用双因素认证方法和数字证书强认证协议,有效增强系统的安全性。
This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.
详细分析了UMTS认证和密钥分配协议的过程以及协议的安全性,找出协议中存在的弱点和可能的攻击,提出了公钥加密协议的改进方法。
The Security Remote Password protocol is an identity authentication protocol based on verifier, which has the security property with Zero-knowledge password proofs.
远程安全密钥协议基于鉴别符认证技术,具有零知识证明性。
In the new protocol we raised, QKD is used in both authentication and data encryption in order to ensure the absolute security of wireless communications.
在提出的新协议中,量子密钥分发被用于认证和数据加密当中,由此可以保证无线通信网络的绝对安全性。
Formal authentication of security protocol is an important field of network security.
安全协议的形式化验证是网络安全的一个重要领域。
In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.
本文分析了IMS认证与密钥分配协议的过程,找出了认证协议中的安全缺陷,并给出了攻击者可能进行的攻击。
This paper follows the RADIUS authentication protocol, J2EE and CORBA system standard specifications, according to the distributed, scalability and security requirements for the designed system.
本文遵循RADIUS认证协议,J2EE技术规范和CORBA体系规范,根据分布式、扩展性和安全性要求来设计系统。
Therefore once the security requirement in single prover condition is satisfied the identity authentication protocol can also be run in multi-provers condition.
因此,只要满足了其中单证明者环境下的安全要求,身份认证协议也能安全地运行在多个证明者的环境下。
And it ensured the data security and integrity in the protocol entities exchange through encryption, authentication, digital signature and one-way permutation function.
并通过加密、认证、数字签名和单向置换函数有效地保证了协议中实体交互数据的安全性和完整性。
Compared with access authentication mechanism based on base mobile IP protocol, security and encryption for the mechanism are enhanced, which can resist common security att...
相比基本移动IP协议的接入认证方法,该方法的加密强度和安全性更高,可以更有效地抵御常见的安全攻击。
Additionally, we discuss the security problem of PPP protocol, including encryption and authentication techniques, which ensures the safety of packets in transit.
还研究了PPP协议的安全问题,包括协议的加密和认证机制,确保报文转发过程中的高速和安全性。
Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.
无线异构网络中的关键安全技术包括安全路由协议、接入认证技术、入侵检测技术、节点间协作通信等。
Encryption and authentication mechanism has no use to defend against wormhole attack. It is need to embed corresponding mechanism in routing protocol to guarantee security.
虫洞攻击容易发动,很难被检测到,一般的加密认证方式不能防御虫洞攻击,需要在路由协议中有针对性添加特定的安全机制。
The shortcomings to 3G Authentication and Key Agreement(AKA) protocol were described through analyzing its procedure and security.
分析了3G认证与密钥协商协议(AKA)的过程和特点,指出了存在的缺陷,提出了一种新的AKA改进方案。
The shortcomings to 3G Authentication and Key Agreement(AKA) protocol were described through analyzing its procedure and security.
分析了3G认证与密钥协商协议(AKA)的过程和特点,指出了存在的缺陷,提出了一种新的AKA改进方案。
应用推荐