驗證密碼 的英文怎麼說

中文拼音 [yànzhèng]
驗證密碼 英文
verify password
  • : 動詞1. (察看; 查考) examine; check; test 2. (產生預期的效果) prove effective; produce the expected result
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 驗證 : test and verify; checking; proving; testing; confirmation; [數學] corroboration; inspection; veri...
  1. ( 3 ) according to the characteristics of the selected objects, the selecting processes and the practical problems in the process of establishing a scm - oriented ave, a three - stage plan and evaluation architecture of partner enterprise selection are presented and a multi - objective optimization model for selecting partner enterprises in aves are given. by means of the methods of integer planning, benchmarking, analytic hierarchy process ( ahp ) and so on, the fuzzy values of critical decision - making factors ( such as

    通過實際應用,該erp系統具有統?一致的信息編、較好的開放性、集成性、外延性,併兼顧了自動與人工、通用化與行業化兩方面,使系統具有較高的柔性和較強的實用性,可輔助企業實現科學、可靠的產品報價和即時生產it卜該erp系統既不失mnyll的系統性和嚴性,又保持了ji
  2. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份和日誌管理等諸多問題;信息傳輸安全主要研究信息加傳輸方案的選擇和實施。
  3. Cryptanalysis and improvement of a signcryption scheme with public verifiability

    一個可公開方案的分析和改進
  4. For the anticounterfeiting of printings ( such as certificate ), the existent many ways ( such as rainbow holograms ) are not available as the need for special use : anti - distortion and anti - copy. basing in the double - random - phase transform, this article puts forward a new way that two - dimensional bar code is used as anticounterfeiting label with anti - printing ? scanning and anti - damage properties. the major job are : ( 1 ). basing in the ascii codes, numerals and alphabets are encoded and subsequently transformed into two - value bar code matrix figure. later, using amplitude - based double - random - phase transform, the enciphered gray scale figure is formed. by computer simulation ( 4f system ) and printing as well as scanning ( 20 times ), we get the result that the gray scale figure with little miscoding rate ( 0. 0026 ) by “ matrix expanding way ”

    本文主要開展了以下三項研究工作: ( 1 ) .用自定義編方案,將數字和字母( ascii)轉換成二值條圖;對該圖形進行振幅型雙隨機相位加變換,得到原信息的加灰度圖;通過4f光學系統計算機模擬和列印-掃描實明本文提出的「矩陣擴展法」灰度圖具有較小的誤率,對於20次列印-掃描實,誤率不大於0 . 0026 。
  5. The password to use for basic authentication and digest authentication

    要用於基本身份和簡要身份
  6. Encryptor for computing the message authentication code

    器以計算消息( mac ) 。
  7. A hash - based message authentication code hmac can be used to determine whether a message sent over an insecure channel has been tampered with, provided that the sender and receiver share a secret key

    在發送方和接收方共享機鑰的前提下,基於哈希的消息( hmac )可用於確定通過不安全通道發送的消息是否已被篡改。
  8. This property identifies all cryptographic functions involved in creating an xml digital signature, including hashing, public key algorithms, message authentication codes macs, and padding

    此屬性標識創建xml數字簽名時涉及到的所有加功能,包括哈希演算法、公鑰演算法、消息身份( mac )和填充。
  9. In addition, a hash is created from the data using a machine authentication code key

    此外,會使用計算機( mac )鑰從數據中創建一個哈希。
  10. Confirm password verify password

    確認驗證密碼
  11. Consider other methods of verifying password transactions, such as sending a confirmation code and a return url that requires users to use the url to complete the transaction

    考慮使用驗證密碼事務的其他方法,如發送確認代和返回url ,要求用戶使用該url完成這一事務。
  12. Windows authentication has certain benefits that make it superior to sql server authentication in most applications, such as secure authentication, password encryption, auditing, password expiration, minimum password length, and account lockout after multiple invalid login requests

    在大多數應用程序中, windows身份因其某些優點而優先於sql server身份,如安全的身份、審核、過期、最小長度和多次無效登錄請求后的帳戶鎖定。
  13. Property gets the regular expression used to evaluate password complexity from the provider specified in the

    屬性中指定的提供程序驗證密碼復雜性的正則表達式。
  14. Property to validate that passwords meet your requirements

    屬性的正則表達式來驗證密碼是否滿足要求。
  15. Validate that passwords are complex

    驗證密碼是復雜
  16. Do not bind this field to any value, it will be used for password verification purposes

    不要將其綁定為任何值,它將用來驗證密碼
  17. Does not verify that the password can open the master key of the specified database

    不會驗證密碼是否可以打開已指定數據庫的主鑰。
  18. When a password is validated, it is combined with a salt value and then hashed

    驗證密碼時,先將其與salt值合併,然後再進行哈希計算。
  19. Attribute to a regular expression that validates the password meets the following criteria

    屬性設置為驗證密碼是否滿足以下條件的正則表達式:
  20. For example, a sequence that validates a password may appear in multiple contexts in a given application

    比如,在一個應用程序中,一個驗證密碼的序列很可能出現在多個上下文環境中。
分享友人