SAML is an authentication protocol that is used between servers.
SAML是一个在服务器之间使用的认证协议。
The following are the main steps in the authentication protocol.
下面是这个身份验证协议中的主要步骤。
Returns the credential for the specified host, port, and authentication protocol.
传回指定主机、连接埠和验证通讯协定的认证。
The second chapter proposes a centralized authentication protocol based on JAAS technology.
第二章提出采用JAAS技术,使用多种机制双向认证的集中式认证协议。
Kerberos is an authentication protocol developed by the Massachusetts Institute of Technology.
Kerberos是由麻省理工学院开发的验证协议。
The KDC service enables users to log on to the network using the Kerberos V5 authentication protocol.
KDC服务允许用户使用KerberosV 5认证协议登录到网络上。
Kerberos essentially consists of a complex process called Kerberos authentication protocol (KAP).
Kerberos在本质上包含一个称为Kerberos身份验证协议(kap)的复杂过程。
A 3g authentication protocol based-on the elliptic curve cryptosystem is presented in this article.
本文提出一种基于椭圆曲线密码体制的3g认证协议。
Kerberos is a security authentication protocol that requires users and services to provide proof of identity.
Kerberos是需要用户和服务提供标示证明的安全性认证协议。
This paper presents a new simple and efficient wireless authentication protocol providing user anonymity.
提出了一种高效的具有用户匿名性的无线认证协议。
User Authentication protocol: This protocol authenticates the client to the server and runs over the transport layer.
用户认证协议:该协议从服务器到客户端进行身份验证,且通过传输层运行。
The contents of the paper are listed as follow:1. Design an authentication protocol based on fingerprint encryption.
设计了一种基于指纹加密技术的网络身份认证协议。
Kerberos is an authentication protocol that USES 'tickets' to verify the identity of a user in an unprotected network.
Kerberos是一种身份验证协议,它使用‘票据’验证未受保护的网络中的用户的身份。
The extensible authentication protocol (EAP) is investigated and the authentication procedure is discussed comprehensively.
重点研究了可扩展认证协议EAP,对EAP的认证过程做了比较全面地探讨。
PAP (Password Authentication Protocol, used with PPP in which the password is sent to the client as clear text for comparison);
PAP(PasswordAuthentication Protocol,密码验证协议,与PPP 一起使用,在此机制下,密码以明文形式被发送到客户机进行比较);
Kerberos is a network authentication protocol originally developed by MIT that provides mutual authentication using symmetric keys.
Kerberos是一种网络认证协议,最初由MIT开发,使用对称密匙实现相互认证。
Fix: the Kerberos authentication protocol requires that the clock skew between a server and a client is no greater than 5 minutes.
解决方案:Kerberos身份验证协议要求服务器和客户机之间的时钟差不大于5分钟。
A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.
一个安全的认证协议能有效抵御恶意的攻击者对通信网进行的欺诈,保证通信网的安全运行。
Connection protocol: This protocol multiplexes the encrypted tunnel to numerous logical channels, running over the User Authentication protocol.
连接协议:该协议多路传输加密隧道到多个逻辑通道,通过用户认证协议运行。
Single Sign On (SSO), which helps manage data server access from a centralized authentication service using Kerberos Authentication protocol
单点登录 (SSO),这有助于使用Kerberos身份验证协议通过集中的身份验证服务管理数据服务器访问
There are many kinds of ways of attacks on authentication protocol, but replay attacks and type flaw attacks account for more than 90 percent of them.
对认证协议的攻击形式有很多,但已构成的攻击事例中,百分之九十以上是重放攻击和类型缺陷攻击。
The security analyses show that the improved authentication protocol is much stronger against these three kinds of attacks than the traditional protocol.
相应的安全性分析明确给出了考虑这三种攻击时,改进的认证协议比以前的协议更加强健。
This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.
本文提出面向消息中间件的分布式认证协议,给出协议内容、形式化描述以及安全性分析。
Therefore once the security requirement in single prover condition is satisfied the identity authentication protocol can also be run in multi-provers condition.
因此,只要满足了其中单证明者环境下的安全要求,身份认证协议也能安全地运行在多个证明者的环境下。
This paper presents a model of Internet-based publishing system of papers. And stresses on user authentication mechanism and authentication protocol based on PKI.
提出了一种基于论文发表系统的模型,重点介绍了基于的用户认证机制和协议。
The Security Remote Password protocol is an identity authentication protocol based on verifier, which has the security property with Zero-knowledge password proofs.
远程安全密钥协议基于鉴别符认证技术,具有零知识证明性。
The verification method was presented based on the above correlation property, which had been used to verify the Woo and Lam authentication Protocol in reverse analysis.
从主体认证关联、消息间关联和消息内部关联三个角度去刻画协议,提出了基于以上关联特点的协议验证方法。
The requirement of supporting multiple authentication in single sign-on scheme often complicates the realization of authentication protocol and cross-realm authentication.
支持多认证方式的单点登录是目前的一个新需求,通常这又使认证协议的实现和跨域的认证更加复杂。
The requirement of supporting multiple authentication in single sign-on scheme often complicates the realization of authentication protocol and cross-realm authentication.
支持多认证方式的单点登录是目前的一个新需求,通常这又使认证协议的实现和跨域的认证更加复杂。
应用推荐