form-based authentication 中文意思是什麼

form-based authentication 解釋
基於表單的驗證
  • form : n 1 形態;形狀;樣子,外貌;【哲學】形式 (opp content)。2 人影,物影。3 格式;表格紙 (= 〈美...
  • based : 基準
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  1. The paper abstracts out the palmprint mainline characteristic owing to palmprint image gradation by the gray value characteristic property method, defining the online palmprint characteristic space with the form of the polar coordinate and compressing the dimension, at last we use the neural network to accomplish the design of identification authentication system with the on - line palmprint as the mating algorithm. based on this, a fast and reliable system of identification authentication can be built

    採用基於掌紋圖像灰度特性的方法提取出掌紋的主線特徵,以極坐標的形式定義在線掌紋的特徵空間並降維處理,最後用神經網路作為匹配演算法完成在線掌紋身份驗證系統的設計,以此為基礎建立了快速、可靠的新型身份認證系統。
  2. In this article, we perform a tri - layer security mechanism ; we improve the form authentication of asp. net in two places ; we also perform a new dynamic authentication based on two factor ; then we perform a new way to send the credential through the soap header ; we solve the problem about the key creation and the key storage and the transmission of the encrypted message ; after analyzing and discussing the soap protocol, we put forward a safely custom authentication through combining the digest authentication and soap protocol and credential

    在web服務安全方面提出了一些新看法,解決了一些新問題: 1 )提出了基於角色的三層安全機制; 2 )對asp , net的表單驗證技術提出了兩處新的改進: 3 )提出一種動態的雙因素口令認證方法,即在單因素(固定口令)認證基礎上結合第二個物理認證因素,以使認證的確定性按指數遞增。在此,本文提出了第二種認證因素?信任憑證。
  3. This paper introduces a new methodology that uses - it knowledge structures, a specific form of kripke semantics for epistemic logic, to analyze communication protocols over hostile networks. the paper particularly focuses on automatic verification of authentication protocols. our approach is based on the actual definitions of a protocol, not on some difficult - to - establish justifications

    認知邏輯的kripke語義已經被成功應用到通信協議的推理分析中例如,交替位協議alternating bit protocol的分析,及最近的對tcp的分析.因為信息交換本質上可以看成是個認知過程,用認知邏輯可以很方便地表達
  4. Follow these steps to create a web clipper that uses form - based authentication

    創建使用基於表單的認證的web裁剪器的步驟如下:
  5. To complete this example, substitute a url that you can access and that requires form - based authentication

    為了完成這個示例,請用您可以訪問的並要求基於表單的認證的url來替代。
  6. In general, to create a web clipper that uses form - based authentication, you need to know following values

    一般來說,為了創建使用基於表單的認證的web裁剪器,您需要知道以下這些值:
  7. Abstract : this paper gives a design method of servo systems input signal, which is based on exact requires of stepping servo systems and combining of traditional form of input signal. it can be easily realiaed by computers and flexiable adjusted by users. the authentication of this approach is also given

    文摘:在基於步進化伺服系統輸入信號的實際需求,結合傳統伺服系統輸入形式,採用曲線擬合的方法,提出一種既便於計算機實現,又可靈活調整的輸入信號設計方法,並給出相關的證明。
  8. Any user id from machinea is allowed to ssh to machineb as the same user id this form of host - based authentication does not allow a user id on one machine to login as a different user id on the other machine

    來自machinea的任何用戶id都可以憑相同的用戶id ssh到machineb (這種形式的基於主機的認證不允許一臺機器上的某個用戶id以不同的用戶id登錄到其他機器上) 。
  9. The web clipping portlet supports two popular types of authentication mechanisms : http basic and form - based

    Web裁剪portlet支持兩種流行的認證機制類型: http基本的和基於表單的。
  10. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  11. In tcp / ip protocol suite, the ipsec protocol provide interoperable, high quality, cryptographically - based security for ipv4 and ipv6. the set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays ( a form of partial sequence integrity ), confidentiality ( encryption ), and limited traffic flow confidentiality

    在tcp ip協議族中, ipsec ( internetprotocolsecurity )協議提供的安全服務保證數據在網路傳輸過程中的機密性、完整性和抗重放保護,以及對網路通信中的通信流分析攻擊提供有限的保護, ipsec協議還提供對網路的訪問控制能力。
分享友人