authentication scheme 中文意思是什麼

authentication scheme 解釋
驗證方案
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  • scheme : n 1 計劃;方案;路線;設計。2 系統;配合;組織。3 綱目;表;清單;分類表;大綱。4 謀劃,策劃;詭...
  1. Cryptanalysis of a remote login authentication scheme based on geometric and improvement approach

    遠程登錄幾何認證方案的安全漏洞分析和解決辦法
  2. At the end of the paper, two efficient deniable authentication protocols are presented on the basis of aumann and rabin ' s scheme

    文章同時在aumann和rabin的可否認認證協議的基礎上提出了兩個可否認認證協議,兩個協議與原方案相比效率得到了較大的改進。
  3. 6. analyze advance signature and identification scheme, a deniable authentication scheme is developed. this deniable authentication is suitable for argy - bargy prototype

    對中高級簽名和認證技術進行研究,在分析了群簽名,環簽名和可否認簽名的基礎上,設計了可否認的認證方案。
  4. In this paper, various kinds of identity - authentication schemes are analyzed and compared, and the individual identity - authentication scheme is designed to meet the requirement of the jarl mis, which was based on fingerprint identification technology, digital signature technology and id technology. the design is also realized in the registration management system by fingerprint

    本文通過對各種身份認證方案進行綜合的分析和比較,並結合監獄指紋點名管理系統對身份認證方案的具體要求,設計了基於指紋識別、數字簽名及智能卡技術於一體的個人身份認證方案,並將它在監獄指紋點名管理系統中予以實現。
  5. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新的一次性口令認證機制。針對postgresql原有認證機制具有易遭受口令猜測攻擊和服務器端假冒攻擊的缺陷,本文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何加密系統,就能有效加強對各種攻擊手段的防範能力。
  6. Digital authentication scheme based on proxy - signcryption

    基於代理簽名的數字認證方案
  7. Security analysis of ku - chien ' s remote authentication scheme

    遠程身份認證方案的安全性分析
  8. Design a user identity authentication scheme based on the elliptic curve cryptosystem

    設計了一種基於該橢圓曲線密碼體制的用戶身份認證方案。
  9. Based on all above studies, the technology to implement secure authentication is described and a sample about user authentication in wcws is designed, which prove out the feasibility of authentication scheme in this paper

    在以上研究的基礎上,本文進一步分析了系統實現技術,最後針對系統的不同用戶進行認證模塊的設計,並給出了嘗試性的實現。
  10. In the near future, biometric identification will be integrated in the smart card operating systems and users can use a combined pin and biometric authentication scheme. related link

    在短期內,生物鑒別法便可與智能卡操作系統結合,讓用戶可一併使用個人密碼及生物鑒別法以確認身分。
  11. Attribute specifies the authentication scheme

    屬性指定身份驗證方案。
  12. Selects the authentication scheme for an

    實例選擇身份驗證方案。
  13. A fast mutual authentication scheme of gsm

    快速雙向認證機制研究
  14. Image authentication scheme research based on fragile watermarking

    基於脆弱水印的圖像認證演算法研究
  15. A two - way user authentication scheme based on elgamal digital signature

    數字簽名的雙向用戶鑒別方案
  16. Vpn group digital signature and identity authentication scheme based on elliptic curves cryptosystem

    兩個高效的基於分級身份的簽名方案
  17. User identification and message authentication are two important aspects of network security. an interactive /. cro knowledge proofs based user identification and also a cross - domain message authentication scheme are proposed in the paper

    本文還設計了一個跨域的信息認證系統,給出了協同產品開發中的跨域信息模型,並提出了相應的跨域認證方案。
  18. In order to solve the problems of current source authentication methods, this thesis brings forward a new source authentication scheme based on the events sequence - - - - esa ( events sequence authentication ). this scheme does not depend on the time synchronous mechanism, and it has the advantages of fast authentication and

    根據現有源認證方法的不足和存在問題,本文提出了基於事件序列的源認證方案esa ( eventssequenceauthentication ) ,該方案不依賴時間同步機制,具有快速認證,抗丟失性和擴展性較好的特點。
  19. The bridge certification authority and the technology of cross authentication in the public key infrastructure are studied. the new cross authentication scheme and certificate revocation scheme based on forward - secure digital signature are proposed. the forward security of new scheme can guarantee the lowest loss and high efficiency in the case that the bca ' s signing secret key is exposed

    研究了公鑰基礎設施中的橋接認證機構和交叉認證技術,提出了基於前向安全數字簽名的交叉認證方案和基於前向安全數字簽名的證書撤消方案,新方案的前向安全性確保了在簽名密鑰泄露的情況下將造成的損失減少到最小。
  20. If you are deploying reporting services on an internet - facing web server, you should replace windows authentication with a custom authentication scheme that gives you more control over how external users are granted access to the report server

    如果您正在面向internet的web服務器上部署reporting services ,則必須使用自定義身份驗證方案替代windows身份驗證,以便更好地控制如何授予外部用戶訪問報表服務器的權限。
分享友人