驗證方式 的英文怎麼說

中文拼音 [yànzhèngfāngshì]
驗證方式 英文
verification mode
  • : 動詞1. (察看; 查考) examine; check; test 2. (產生預期的效果) prove effective; produce the expected result
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : Ⅰ名詞1 (方形; 方體) square 2 [數學] (乘方) involution; power 3 (方向) direction 4 (方面) ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 驗證 : test and verify; checking; proving; testing; confirmation; [數學] corroboration; inspection; veri...
  • 方式 : way; fashion; pattern
  1. When verifying a cert i i ' irate, all the user needs to do is just checking the trusty matrix

    為克服其不足,我們應用代數法,提出了一種新型的pki
  2. The result of the experimentation make clear that the system can achieve identity logging on very well. it is security and expedite. it can completely replace traditional logging on way

    結果表明,整個系統能夠很好地實現電子商務身份論,安全性高,並且便、快捷,完全可以取代傳統的身份論
  3. First, this paper introduces the notation, categories and properties of security protocols, and formal methods to verify security protocols and small system model. the emphasis is the research and analysis of the principle of the model checking method. we study the mechanism and syntax of symbolic model checking tool smv, model check the authentication version of needham - schroeder public key protocol and woo and lam ij symmetric key protocol

    文章主要介紹了安全協議的概念、分類和性質,安全協議的形法,以及小系統模型的原理;重點分析和研究了符號化模型檢工具smv的原理和語法及其對安全協議進行模型檢時的工作機理,而且使用smv對needham - schroeder公鑰協議和wooandlam對稱鑰協議進行了形化建模與模型檢,發現了它們的安全漏洞。
  4. A new type of viscoelastic stochastic finite element method is established using first - order perturbation theory based on local averaging method of random field and karhunen - loeve expansion theory of random process. the amount of computations is greatly reduced by transforming correlated random variables to a set of uncorrelated random variables. the relations of different random response variables are analyzed and monte carlo simulations for viscoelastic stochastic structures are investigated

    基於隨機場的局部平均法以及隨機過程的karhunen - loeve分解理論,通過一階隨機攝動法建立了考慮材料近似不可壓縮的粘彈性隨機有限元公,由相關結構分解減少計算量,分析了各結構隨機響應量之間的關系,給出了數字特徵的計算法,研究了粘彈性隨機結構的montecarlo模擬法。
  5. And it increases the security by the identification of the authencticator and the authenticatation server. after this, puts forward a method to implement it

    在實現該認的基礎上,增加認系統對認服務器的身份提高整個認流程的安全性。
  6. The thesis shows its originality in the following aspects : first, it attempts to take a positive mean to explore the cultivation functions of chinese mass media and gives a systematic test of the relation between the perceived reality, media reality and the objective reality ; investigates media effects on the audience and their outlooks, and comes to the conclusion that the length of watching tv is not the leading factor affecting the cultivation effects and it doubts the applicability of the cultivation assumption in china. second, it scans all the tv series shown in different provinces in china, does a sample analysis and outlines the violence on screen in china

    本論文在如下面具有創新意義:首次嘗試以實探討我國大眾傳媒的涵化(培養)功能,比較系統地檢了觀念現實、媒介現實及客觀現實三者之間的關系,考察了媒介現實對受眾觀念的作用,發現收視時長並非影響涵化效果的決定性因素,從而對涵化基本假設在中國的適用性提出質疑;首次對全國省級以上衛視臺黃金時段播出的電視劇進行全面掃描和抽樣分析,勾勒出中國大陸熒屏暴力的基本素描。
  7. Formal verification of hybrid systems

    混合系統的形
  8. A full implement scheme of soc software / hardware co - emulation system is given, including the communication protocol between software and hardware, data format, synchronous mechanism between software and hardware of different emulation modes

    給出了一套完整的soc軟硬體協同系統的實現案,其中包括了兩種不同的軟硬體之間的通訊協議、數據格、軟硬體的同步機制等。
  9. We will adopt a " proof of concept " approach to test out e - procurement at departmental level with a view to improve internal efficiency and encourage external suppliers, especially the smes, to take on e - business

    我們會採用「概念在部門層面試行電子采購,以增強內部效率和鼓勵外間的供應商特別是中小型企業參與電子商務。
  10. Certainly, the traditional type of validation has its uses

    當然,傳統的驗證方式有其用途。
  11. Enumeration value indication how the accessibility checkpoint is verified

    枚舉值,指示可訪問性檢查點的驗證方式
  12. You have several options for authenticating the asp. net identity for your application

    對于應用程序的asp . net標識,您有多種可供選擇的身份驗證方式
  13. When connecting to the local server using windows authentication recommended, select

    使用windows身份(建議使用的驗證方式)連接到本地服務器時,選擇
  14. Therefore, you can use only one form of authentication per server instance for database mirroring

    因此,可以對數據庫鏡像的每個服務器實例只使用一種驗證方式
  15. A characterization of an external entity, often based on how it is authenticated and what privileges it has

    外部實體的特徵,通常基於其身份驗證方式和擁有的特權。
  16. One general concept to keep in mind about xml is that xml documents can be processed in either a validating or non - validating fashion

    關于xml ,要記住一個總體概念:可以或非驗證方式處理xml文檔。
  17. The trust on this authenticator is verified in the same way as the trust is verified when the database owner is the authenticator

    此身份者是否可信的與數據庫所有者作為身份者時的驗證方式相同。
  18. Windows forms provides several ways for you to verify the correctness of data at various moments in your application s lifetime

    Windows窗體提供了幾種可以在應用程序生存期的各個時間用來數據是否正確的驗證方式
  19. The last part of this paper serves as a summary. in one hand, fpga design is different than asic design in essence. fpga prototype verification can not replace the traditional method

    論文的最後對全文進行總結:一面, fpga實現和asic實現本質上是不同的, fpga原型系統是asic設計和fpga設計的折中, fpga原型不能取代傳統的驗證方式
  20. When you specify ltpa authentication, you will use data for the user who is logged into the websphere portal server where the remote rendering portlet is deployed to authenticate to the remote workplace web content management server

    當指定ltpa身份驗證方式時,將使用登錄到websphere portal服務器(遠程呈現portlet部署在該服務器上)的用戶數據來遠程workplace web content management服務器。
分享友人