Then digital signature and authentication schemes are given.
同时给出了数字签名和身份认证方案。
He Outlines the rules for designing authentication schemes for REST API's.
他勾勒了RESTAPI的认证机制的设计规则。
Almost all Rails authentication schemes use before filters on the controller.
几乎所有的Rails认证模式都会在控制器上使用before过滤器。
More secure authentication schemes could be implemented with additional coding effort.
通过进行其他编码工作,可以实现更安全的身份验证方案。
The WWW-Authentication header points out the authentication schemes of the protected resources.
WWW - Authentication头部指出保护资源的认证模式。
By default, only basic, digest, and NTLM authentication schemes are supported in HttpClient.
默认情况下,在HttpClient中仅支持基础认证、摘要认证和NTLM认证。
For a full description of the different authentication schemes, refer to the DB2 UDB Documentation.
关于各种身份验证方案的完整描述,请参阅DB 2UD b文档。
The IBM solution adds value to the IMS standard by supporting multiple authentication schemes and service profiles.
IBM解决方案通过支持多身份验证模式和服务配置文件增加了IMS标准的价值。
DATA_ENCRYPT_CMP - This specifies that the server accepts encrypted server authentication schemes and the encryption of user data.
DATA_ENCRYPT _ CMP——这指定服务器接受加密的SERVER身份验证模式和用户数据的加密。
Via analyzing a sort of existing authentication schemes, several conception of research authentication mechanisms are pointed out.
通过对现有认证方案的分析,提出了几种研究认证机制的设想。
In a word, message authentication schemes are used in the three important stages: Key agreemnet, routing discovery and data communication.
消息认证技术被用到了移动自组网通信的三个重要阶段:密钥协商、路由发现、数据通信。
Currently, Mobile AD Hoc Networks is getting more and more attention at home and abroad, especially the key agreement and authentication schemes.
目前移动自组网的安全问题越来越受到国内外的重视,特别是密钥协商和消息认证技术。
Traditional password authentication schemes are vulnerable to replay attacks because of the fixed password and unchanged messages submitted by users for verification.
由于每次登录时用户提交的认证信息都是固定不变的,传统的口令认证机制容易遭受回放攻击。
In view of the above problems, this paper researches and designs two multicast source authentication schemes that are suitable for IP multicast and wireless multicast.
针对上述问题,本文研究和设计了两种分别适合于IP组播和无线网络组播的源认证方案。
It shows the size of the secret key space for each participant under the security level, provides the construction about authentication schemes for dynamic conferences.
说明了他们在某一安全水平下用户密钥空间的大小,并给出了前一类认证系统的具体构造。
At present, most of the session initial protocol (SIP) authentication schemes only provide client-to-server authentication. And HTTP digest authentication is one of them.
目前,会话初始协议(SIP)大部分认证机制只提供了服务器到客户端的认证,HTTP摘要认证便是其中的一种。
When designing practical IP multicast source authentication schemes, qualitative and quantitative analyses can help to choose the scheme which best meets the application...
在设计实用的IP组播源认证方案时,可以依据定量及定性分析的结果,挑选最能满足应用需求的方案。
With the appropriate persuasion, increasing the security of your authentication schemes can be as easy as applying these control algorithms to your current password entry code.
通过适当的说服工作,增加身份验证方案的安全性可以像对当前密码输入代码应用控制算法一样简单。
In this paper, many password authentication schemes are proposed based on both the discrete problem and factorisation problem. In addition, three new signature schemes are presented and investigated.
本文首先利用离散对数和分子因解问题提出了许多口令认证方案。其次建立并分析了三个新型数字签名方案。
One of the major features of NFS Version 4 is its support for enhanced security schemes, which allow stronger authentication, fine-grained access control, and encrypted data traffic.
NFSVersion4的主要特性之一就是它对增强型安全方案的支持,该方案允许更强的身份验证、细粒度的访问控制以及加密的数据通信。
A remote password authentication scheme is given only applying some arithmetic operation and an one_way function in field GF (p), and analyses this schemes security and computing property.
应用GF (P)上的代数运算和单向函数,构造了一种不用通行字表的远程通行字认证方案,并对该方案进行了安全性分析和计算特性分析。
The paper introduces two schemes of identity authentication:the authentication based on password and the authentication based on digital certificate.
对基于口令的身份认证机制和基于数字证书的身份认证机制分别进行了介绍。
The paper introduces two schemes of identity authentication:the authentication based on password and the authentication based on digital certificate.
对基于口令的身份认证机制和基于数字证书的身份认证机制分别进行了介绍。
应用推荐