authentication data 中文意思是什麼

authentication data 解釋
鑒別數據
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  1. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝數據、網上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管規則實現了對網路封包的認證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  2. Finally, the application of the model of data remote transmittal based on ca authentication in aerotech manufacture corporation quality control system is illustrated in the dissertation

    最後,介紹了基於ca認證的數據遠程存取模型在成都aerotech製造有限公司的產品質量控制系統中的應用。
  3. A elliptic curve digital signature and authentication algorithm of independent knowledge property right is designed and implemented on computer in this theme. data integrality and user authenticity is ensured

    本課題中設計了一種擁有自主知識產權的橢圓曲線數字簽名和驗證演算法,並在微機上進行了實現,確保了數據的完整性和用戶身份真實性。
  4. As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today ' s communication network. it can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission. our task focuses on studying the key technology in digital signature. the direct goal is to implement digital signature on the basis of dsp

    在現代的數字通信網路中,數字簽名作為數據認證技術中的一項關鍵技術,可以解決否認、偽造、篡改及冒充問題,用來保證信息傳輸過程中的完整性,提供信息發送者的身份認證和不可抵賴性。
  5. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  6. The ability of keeping the ip packet ' s integrity, secrecy, authentication, data origination, anti - relay is discussed. the relationship of ipsec component authentication header ( ah ), encapsulating security payload ( esp ) and ike ( internet key exchange ) is also talked about. this discussion of ipsec makes the impression that ipsec make ip layer security enough

    論述了ipsec在ip報文的完整性、機密性、數據來源認證和抗重播等方面的能力, ipsec的基本協議? ?認證報文頭( ah )和安全封裝載荷報頭( esp )與ipsec安全體系的其它組成部分如安全策略、加密和認證演算法、密鑰管理等如何合作,共同完成對ip報文的安全保護。
  7. The java secure socket extension jsse enables secure internet communications with ssl tls. it provides an application framework - a java version of the ssl and tls protocols - complete with the full range of functionality including data encryption, server authentication, message integrity, and more

    Java安全套接字擴展( jsse )利用ssl / tls可以進行安全的internet通信,它提供了一個具有完整功能的應用程序框架一個java版本的ssl和tls協議,這些功能包括數據加密、服務器認證、消息完整性,等等。
  8. Active directory application mode adam is a new mode of the active directory directory service that is designed to meet the needs of line - of - business applications that require a dedicated lightweight directory access protocol ldap data store, e - commerce applications that require simple ldap authentication support, and enterprise environments that require an application directory that is separate from their network operating system infrastructure directory

    Active directory應用程序模式( adam )是active directory目錄服務的新模式,設計用於滿足以下應用程序或環境的需要:需要專用輕型目錄訪問協議( ldap )數據存儲的行業應用程序,需要簡單ldap身份驗證支持的電子商務應用程序,以及需要獨立於網路操作系統( nos )結構目錄的應用程序目錄的企業環境。
  9. Class will automatically invoke your custom provider to communicate with your authentication data source

    類將自動調用自定義提供程序來與您的身份驗證數據源進行通信。
  10. Sensitive information includes password and authentication data, or any data you do not want to expose to an unwanted source

    敏感信息包含密碼和身份驗證數據或不希望公開給不明來源的任何數據。
  11. Specifying a secure server protects the report definition and authentication data from being intercepted while the report is published

    通過指定安全的服務器,可以在發布報表時保護報表定義和身份驗證數據,以防他人截獲。
  12. Authenticated streams can provide authentication, data signing, and encryption services that can help maintain the integrity and confidentiality of data transmitted using the

    經過身份驗證的流可以提供身份驗證、數據簽名和加密服務,這些服務有助於維護使用
  13. To create a j2c authentication data entry

    為創建一個j2c認證數據條目,需要做:
  14. Create a j2c authentication data entry

    創建一個j2c認證數據條目
  15. Furthermore, the scheme requires no additional authentication data to perform integrity verification

    而在作完整性檢驗時,該方案並不需要其他的輔助性認證數據。
  16. A java 2 connector authentication data entry defines authentication data that you can share among resource adapters and jdbc data sources

    Java 2連接器( j2c )認證數據條目定義了您可以在源適配器和jdbc之間共享的認證數據。
  17. You are assuming websphere application server is using authentication data that is specified in the initialcontext creation to authenticate

    您假設websphere application server使用initialcontext創建中指定的認證數據來進行認證。
  18. This protocol is implemented based on lsb watermark technology. its highlight points are : the verification and authentication data are embedded into the images " data, any changes of pixel values and changes in image size due to scaling or cropping as well as block swapping in images or corresponding block swapping between images can be detected and located, logo image is unnecessary

    本文提出的基於數字水印技術的數字圖像完整性與身份驗證技術綜合了信息安全技術中有關消息完整性與身份驗證的方法與數字水印技術,並充分考慮到了數字圖像的特殊性,提出了兩種協議模型:無仲裁協議模型與有仲裁協議模型。
  19. According to the characteristices of network manufacture system, this paper analyses its security problem such as identity authentication, data encryption, data integrality authentication. this paper brings forword a resolvent based on ipsec vpn for network manufacture system security problem

    本文根據網路化製造系統的特點,分析了網路化製造系統的網路安全需求,包括身份認證、數據保密性、數據完整性等問題,以ipsecvpn技術為基礎,提出了一種適合網路化製造系統的安全解決方案。
  20. It offers semantic security, data authentication, data integrity and freshness

    它能提供網路數據內容的語義加密、數據源認證、數據完整性和數據新鮮。
分享友人