認證模塊 的英文怎麼說

中文拼音 [rènzhèngkuāi]
認證模塊 英文
dam dect authentication module dect
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • : 名詞(古時佩帶的玉器) penannular jade ring (worn as an ornament in ancient china)
  • 認證 : [法律] attestation; authentication; identification認證費 certification fee; 認證條款 testimonium ...
  • 模塊 : camac module,camac
  1. In proc. the 6th acm sigmobile int. conf

    基於應用的差別服務可以和協議集成在一起。
  2. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個之間通過內存共享技術完成對控管規則、封裝數據、網上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管規則實現了對網路封包的操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  3. Through analyzing in theory and proving in practice, this paper indicates that the module - control system have many merits : the develop cycle is short ; the application of room is sufficient ; the problem will be found easily in the process of debugging ; the capability of anti - jamming is strong ; maintain and check errors easily ; interchangeability is good ; upgrade is easy

    通過理論分析和實踐明,本文化控制具有開發周期短、充分利用空間、在調試的時候容易發現問題、抗干擾能力強、容易維修和檢查錯誤、降低維修成本、互換性強、容易改進和升級等優點。
  4. Coldfire mcf5235 mcu has a hardware security unit, which can implement popular encryption algorithms and digest algorithms. these security algorithms in srtp / mikey can be implemented by the security unit, so this paper also presents how to use it to implement these algorithms

    本項目中的硬體平臺mcu ( coldfiremcf5235 )自身帶有硬體安全單元,可以實現目前廣泛使用的加密演算法和演算法,本課題中兩個協議內部的加密演算法和演算法就是通過該安全單元實現,因此本論文也論述了如何使用mcf5235硬體安全單元實現這些安全演算法。
  5. The system structure of certificate authority and the function modules of the system are introduced in the system structure part. therefore the article introduces the detailed methods of establishing certificate authority and the establishment of data certificate. meanwhile, the article discusses the actual functions of digital certificate in office automatic system on web, and the key management security of the digital certificate

    在系統總體結構中,主要討論了ca體系的體系結構和系統的主要功能;在系統的具體實現中,討論了ca中心的建立的技術以及ca中心生成數字書的方法;在系統的實際應用中,結合mthsca的特點,討論了數字書在某摩托化步兵師網上自動化辦公系統中的具體應用;在系統安全性方面,討論了數字書的密鑰安全管理。
  6. Then author carried out the system design and realized the system according the payment model, the system has been divided into four components as following : electronic wallet, merchant server, payment gateway and certificate authority

    之後,作者對整個型進行了詳盡的系統分析,依據協議參與方的要求,將整個型劃分為四個核心功能:持卡者電子錢包、商家系統、支付網關和中心。
  7. The module of customer certification adds one - off password certification to the traditional sheet certification, and replaces stored password with stored digest of user password to guard against attacks and keep secrets

    用戶認證模塊在傳統基於表單的方式上增加一次性口令,並且在密碼存儲時以存儲用戶密碼消息摘要替代密碼本身,從而達到防攻擊和保密的目的。
  8. Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme. this system include : local key management module key server module encrypt / decrypt module winsocket module and other module, this system solve the problem of security communication in distributed multipoint multimedia conferences system effectively

    混合加密系統主要包括以下:本地密鑰管理、密鑰服務器、加密和認證模塊、網路socket、其它輔助等。本系統有效解決了基於voip技術的分散式網路多媒體會議系統中信息安全傳輸的問題。
  9. This paper gives the collectivity structure and function structure of lbs system and this paper develops the main system module including counting model, application management model, system management model, consumer management model, accredit model, interface model etc

    本論文設計了位置服務本地接入子系統的總體結構,具體實現計費、業務管理、系統管理、用戶管理授權、介面適配設計。
  10. Now the csp modules that we can free avail all come from the software csp shipped with the windows system. these software csps are portable in that they can be carried as an executable file, but they inevitably have some limitations : the software csps have the less tamper - resistant and would be inconvenient in the fields of the interactive logon, e - mail signing, e - mail decryption and remote access authentication ; ' they have the lower level degree of security

    但鑒於我們現在可獲得的一系列的csp,均來自windows系統自帶的軟體csp ,軟體csp可以以可執行性文件的形式存在、具有易攜帶性的優點,但是它在防篡改、遠程登陸、用戶的身份等領域有其不可克服的缺陷,安全等級比較低。
  11. Hybrid machine learning ( hml ) is the latest applying in the field of intelligent information process. it combines the induced learning based - on decision - making tree with the blocking neural network. and it provides a useful intelligent knowledge - based data mining technique

    混合機器學習是在智能信息處理上的最新應用,它把以決策樹為基礎的歸納學習與化的神經網路演算法結合起來,從而提供了一種在知識基礎上進行實和確的行之有效的智能化數據挖掘過程,其核心演算法是id3和ftart 。
  12. Jaas is built on a security architecture known as pam pluggable authentication module

    Jaas建立在一種稱為可插入的認證模塊( pluggable authentication module , pam )的安全體系結構之上。
  13. If authibmdb2authoritative is " off, " then iff the user is not found in the database, let other auth modules try to find the user

    如果authibmdb2authoritative為" off " ,當在數據庫中沒有發現用戶時,則讓其他認證模塊嘗試發現用戶
  14. For now, it s a linux - only feature that works by integrating with pam pluggable authentication modules and nss name service switch

    目前來說,它是只能在linux上使用的特性,通過與pam (可插入認證模塊)和nss (名稱服務開關)進行集成來工作。
  15. This article gives you the answer : unix linux pam pluggable authentication module - compatible systems that use authentication based on the gnu md5 extensions to the crypt system call

    本文為您提供了答案:這就是unix / linux pam ( pluggable authentication module ,可插入認證模塊)兼容的系統,它使用了以
  16. Based on all above studies, the technology to implement secure authentication is described and a sample about user authentication in wcws is designed, which prove out the feasibility of authentication scheme in this paper

    在以上研究的基礎上,本文進一步分析了系統實現技術,最後針對系統的不同用戶進行認證模塊的設計,並給出了嘗試性的實現。
  17. Secondly, we particularly describe some modules such as gatekeeper kernel module ( gkcore ), authorization module, and radius module, and provide some parts of implementing details and important workflows

    接著,對于網守的部分,如網守核心協議( gkcore ) 、認證模塊和radius客戶端作了詳細描述,並給出了部分實現細節和重要工作流程。
  18. Secondly, we particularly describe some modules such as gatekeeper kernel module ( gkcore ), web communication module and authorization module, and provide some parts of implementing details and important workflows

    接著,對于網守的部分,如網守核心協議( gkcore ) 、 web通信認證模塊作了詳細描述,並給出了部分實現細節和重要工作流程。
  19. This article shows you step by step how to compile and configure mod auth ibmdb2 an apache authentication module using ibm db2 universal database as the database for storing user and group information

    本文一步一步地向您展示在使用ibm db2 universal database ( udb )作為存儲用戶和組信息數據庫的情況下,如何編譯和配置mod _ auth _ ibmdb2 (一個apache認證模塊) 。
  20. System security and reliability for remote monitoring and control are greatly improved by an authentication module which realize user authentication, encrypt, decrypt and check, an application for the design in home monitoring and control is also introduced

    摘要通過在系統中加入一安全認證模塊來實現客戶身份,加密,解密和校驗,有效提高了遠程控制系統的安全性和可靠性,並介紹該設計方案在住宅監控系統中的應用。
分享友人