• Then digital signature and authentication schemes are given.

    同时给出数字签名身份认证方案

    youdao

  • He Outlines the rules for designing authentication schemes for REST API's.

    勾勒了RESTAPI认证机制设计规则

    youdao

  • Almost all Rails authentication schemes use before filters on the controller.

    几乎所有Rails认证模式都会控制器使用before过滤器

    youdao

  • More secure authentication schemes could be implemented with additional coding effort.

    通过进行其他编码工作可以实现安全身份验证方案

    youdao

  • The WWW-Authentication header points out the authentication schemes of the protected resources.

    WWW - Authentication头部指出保护资源认证模式。

    youdao

  • By default, only basic, digest, and NTLM authentication schemes are supported in HttpClient.

    默认情况下,在HttpClient中支持基础认证、摘要认证NTLM认证。

    youdao

  • For a full description of the different authentication schemes, refer to the DB2 UDB Documentation.

    关于各种身份验证方案完整描述请参阅DB 2UD b文档

    youdao

  • The IBM solution adds value to the IMS standard by supporting multiple authentication schemes and service profiles.

    IBM解决方案通过支持身份验证模式服务配置文件增加了IMS标准价值

    youdao

  • DATA_ENCRYPT_CMP - This specifies that the server accepts encrypted server authentication schemes and the encryption of user data.

    DATA_ENCRYPT _ CMP——指定服务器接受加密SERVER身份验证模式用户数据加密

    youdao

  • Via analyzing a sort of existing authentication schemes, several conception of research authentication mechanisms are pointed out.

    通过现有认证方案分析,提出几种研究认证机制设想

    youdao

  • In a word, message authentication schemes are used in the three important stages: Key agreemnet, routing discovery and data communication.

    消息认证技术到了移动自组网通信三个重要阶段密钥协商路由发现数据通信。

    youdao

  • Currently, Mobile AD Hoc Networks is getting more and more attention at home and abroad, especially the key agreement and authentication schemes.

    目前移动组网的安全问题越来越受到国内外重视特别是密钥协商消息认证技术。

    youdao

  • Traditional password authentication schemes are vulnerable to replay attacks because of the fixed password and unchanged messages submitted by users for verification.

    由于每次登录时用户提交认证信息都是固定不变传统口令认证机制容易遭受回放攻击

    youdao

  • In view of the above problems, this paper researches and designs two multicast source authentication schemes that are suitable for IP multicast and wireless multicast.

    针对上述问题本文研究设计了两种分别适合IP无线网络组播的认证方案

    youdao

  • It shows the size of the secret key space for each participant under the security level, provides the construction about authentication schemes for dynamic conferences.

    说明了他们某一安全水平用户密钥空间大小并给出了前一类认证系统的具体构造

    youdao

  • At present, most of the session initial protocol (SIP) authentication schemes only provide client-to-server authentication. And HTTP digest authentication is one of them.

    目前会话初始协议(SIP)大部分认证机制提供了服务器到客户端的认证,HTTP摘要认证便是其中一种

    youdao

  • When designing practical IP multicast source authentication schemes, qualitative and quantitative analyses can help to choose the scheme which best meets the application...

    设计实用IP组播认证方案时,可以依据定量定性分析的结果,挑选能满足应用需求方案

    youdao

  • With the appropriate persuasion, increasing the security of your authentication schemes can be as easy as applying these control algorithms to your current password entry code.

    通过适当说服工作增加身份验证方案安全性可以当前密码输入代码应用控制算法一样简单

    youdao

  • In this paper, many password authentication schemes are proposed based on both the discrete problem and factorisation problem. In addition, three new signature schemes are presented and investigated.

    本文首先利用离散对数分子因解问题提出许多口令认证方案其次建立分析了三个新型数字签名方案。

    youdao

  • One of the major features of NFS Version 4 is its support for enhanced security schemes, which allow stronger authentication, fine-grained access control, and encrypted data traffic.

    NFSVersion4主要特性之一就是增强型安全方案支持方案允许更强身份验证细粒度访问控制以及加密数据通信

    youdao

  • A remote password authentication scheme is given only applying some arithmetic operation and an one_way function in field GF (p), and analyses this schemes security and computing property.

    应用GF (P)上的代数运算单向函数,构造了一种不用通行字表的远程通行认证方案方案进行了安全性分析计算特性分析。

    youdao

  • The paper introduces two schemes of identity authentication:the authentication based on password and the authentication based on digital certificate.

    基于口令身份认证机制基于数字证书身份认证机制分别进行了介绍

    youdao

  • The paper introduces two schemes of identity authentication:the authentication based on password and the authentication based on digital certificate.

    基于口令身份认证机制基于数字证书身份认证机制分别进行了介绍

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定