無效密碼 的英文怎麼說

中文拼音 [xiào]
無效密碼 英文
invalid password
  • : 無Ⅰ動詞(沒有) not have; there is not; be without Ⅱ名詞1 (沒有) nothing; nil 2 (姓氏) a surn...
  • : Ⅰ名詞(效果; 功用) effect; efficiency; result Ⅱ動詞1 (仿效) imitate; follow the example of 2 ...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 無效 : of no avail; to no avail; invalid; null and void; nullity (合同等的); in vain; unavailability; ...
  1. A simple page is shown to users, communicating that they entered an invalid user password combination see

    向用戶顯示一個簡單的頁面,表明他們輸入了一個的用戶名/組合(參見
  2. The algorithm have the good one - way property, high sensitivity to initial values and good security due to the intrinsic characteristic of chaotic system and rijndael algorithm. the simulation experiment demonstrates the convenience and good hash performance ; 3 ) a new scheme of digital voice secure communication was proposed based on chaotic modulation without additional synchronization. the modulation sequence generated by chaotic logical mapping was used to encrypt the digital voice signal

    混沌系統和rijndael演算法的固有特點使該演算法具有較好的安全性、對初值有高度的敏感性以及較好的單向性能,並且易於實現,是一種有的單向hash函數; 3 )研究了一種需同步的基於混沌調制的數字語音保通信系統的方案,利用邏輯映射產生混沌調制序列,以該序列作為對數字語音進行加處理,為了更好的隱匿信號特徵,混沌調制在小波分解的基礎上,對不同的通道使用不同的參數進行,並借鑒混沌掩蓋對信息信號進行了限幅處理,使文完全隨機化。
  3. This paper provides security analysis of a mutual authentication and key establishing protocol based on elliptic curve cryptography for wireless communication, which can withstand the above attacks and can be used in wireless terminals

    在結合橢圓曲線體制優點的基礎上,提出一種適于線通信網路中的相互認證和鑰建立協議,不僅能有防止上述攻擊,還適于在線終端設備上應用。
  4. Acce denied because username and / or pa word is invalid on the domain

    訪問被拒絕是因為在本局域網中用戶名或者
  5. Access denied because username and / or password is invalid on the domain

    訪問被拒絕是因為在本局域網中用戶名或者
  6. Invalid password answer attempts are not tracked

    ,則不跟蹤輸入無效密碼提示問題答案的嘗試次數。
  7. Invalid password and password answer attempts are tracked in the

    輸入無效密碼提示問題答案的嘗試次數通過下面的方法進行跟蹤:
  8. Specifies the number of allowed password or password answer attempts that are not valid

    指定允許的無效密碼無效密碼提示問題答案嘗試的次數。
  9. If the number of invalid passwords or password questions supplied for a membership user exceeds the

    指定的分鐘數內,如果為某一成員資格用戶所輸入的無效密碼提示問題答案的次數超過
  10. Gets the number of invalid password or password - answer attempts allowed before the membership user is locked out

    獲取鎖定成員資格用戶前允許的無效密碼無效密碼提示問題答案嘗試次數。
  11. Gets the time window between which consecutive failed attempts to provide a valid password or password answer are tracked

    獲取在鎖定成員資格用戶之前允許的最大無效密碼無效密碼提示問題答案嘗試次數的分鐘數。
  12. Gets the time window between which consecutive failed attempts to provide a valid password or password answers are tracked

    獲取在鎖定成員資格用戶之前允許的最大無效密碼無效密碼提示問題答案嘗試次數的分鐘數。
  13. If the maximum number of valid password or password answer attempts that are not valid occurs, the membership user is locked out

    如果達到了允許的無效密碼提示問題答案的最大嘗試次數,將鎖定成員資格用戶。
  14. Gets the number of minutes in which a maximum number of invalid password or password - answer attempts are allowed before the membership user is locked out

    獲取在鎖定成員資格用戶之前允許的最大無效密碼無效密碼提示問題答案嘗試次數的分鐘數。
  15. To prevent users from using specific passwords, add it to the list of invalid passwords in an item called password in the file dmsecurity

    為了防止用戶使用某些指定的,就要將這些添加到文件dmsecurity中名為password的條目中的無效密碼清單里。
  16. Experiment shows, as the optimization of this paper, the speech and security of the elliptic curve cryptosystem is improved in a certain extent, this makes it can adapt to resource limited enviorment such as vpn 、 wireless net and smat cards more

    實驗證明,本文的優化工作,使橢圓曲線系統的運行率和安全性能在一定程度上得到了提高,從而使它更適用於vpn 、線網路、智能卡等資源受限的應用環境。
  17. With the fast development of internet, the problem of information security looks increasingly important. then on the basis of safe and high efficient encryption algorithm, some related network protocols are produced. compared with some other public key cryptosystems, elliptic curve cryptosystem ( ecc ) has many merits, so the special attention is paid to it by the network safety specialist in the world. ecc is widely argued because of no standard source code. in this article, the research is on the ecc theory and the implementation of it is also done

    隨著網際網路的快速發展,信息安全問題顯得日益重要。相關網路安全協議應運而生,而它們的基礎都是安全高的加演算法,橢圓曲線加系統與其他公鑰加系統相比有許多優點,受到國內外安全專家的極大關注。可是橢圓曲線加系統( ecc )並公開的標準源代,還處于「百花齊放,百家爭鳴」的局面,文章對于安全的橢圓曲線加系統做了理論研究和實現工作。
  18. And no, i have not forgotten my pass word or my " safety question "

    用戶名錯誤或安全問題回答錯誤,您可以有至多5次嘗試,請返回。
  19. Windows authentication has certain benefits that make it superior to sql server authentication in most applications, such as secure authentication, password encryption, auditing, password expiration, minimum password length, and account lockout after multiple invalid login requests

    在大多數應用程序中, windows身份驗證因其某些優點而優先於sql server身份驗證,如安全的身份驗證、、審核、過期、最小長度和多次登錄請求后的帳戶鎖定。
  20. Is reached, the counter that tracks the number of invalid attempts is reset to zero

    之前輸入了有提示問題答案,則跟蹤嘗試次數的計數器將被重置為零。
分享友人