身份認證 的英文怎麼說

中文拼音 [shēnbīnrènzhèng]
身份認證 英文
authentication
  • : Ⅰ名詞1 (身體) body 2 (生命) life 3 (自己; 本身) oneself; personally 4 (人的品格和修養) on...
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • 身份 : 1. (人的社會、法律地位) status; capacity; identity 2. (受人尊敬的地位) dignity
  • 認證 : [法律] attestation; authentication; identification認證費 certification fee; 認證條款 testimonium ...
  1. The ultimate aim is to create a fully electronic environment which offers an alternative to the documents in use for international trade., . as long as our country is concerned, althrough we have set down some laws on e - commerce security, there are a lot of problems for us to solve

    三是bolero系統意圖建立一個電子交易社區,通過身份認證,建立社區成員間的信任關系,保成員間的電子商務能夠得到順利進行,具有較強的安全性和獨立性,我國具備條件的外貿和航運企業可以考慮加入。
  2. Then the author focus on schemes including identification, digital signature and deniable authentication, and several classical algorithms are addressed as well. in addition, we analyze the differences between standard security paradigm and random oracle paradigm. based on all above, by using elliptic curve, we establish a new identification scheme and its corresponding digital signature scheme under random paradigm

    文章詳細的分析了系統的三種類型,即身份認證、數字簽名和消息,剖析了一些經典的方案,並對標準安全模式與隨機oracle模式做出比較,並基於隨機oracle模式提出了一個新的身份認證演算法及其相應的數字簽名變形,兩個演算法均在橢圓曲線上實現。
  3. In this paper, various kinds of identity - authentication schemes are analyzed and compared, and the individual identity - authentication scheme is designed to meet the requirement of the jarl mis, which was based on fingerprint identification technology, digital signature technology and id technology. the design is also realized in the registration management system by fingerprint

    本文通過對各種身份認證方案進行綜合的分析和比較,並結合監獄指紋點名管理系統對身份認證方案的具體要求,設計了基於指紋識別、數字簽名及智能卡技術於一體的個人身份認證方案,並將它在監獄指紋點名管理系統中予以實現。
  4. Password security hardening based on keystroke dynamics

    擊鍵特徵加強口令身份認證安全性的研究
  5. With the rapid development of the internet and electronic commerce, it is required that service division should be more and more specialized and fine - sorted. as a result, public - key infrastructure ( pki ), which has both the function for the authentication and the function for the authorization, has become maladjusted in the present information technology society

    隨著internet和全球電子商務的突飛猛進,對服務分工要求越來越細的同時,現有公鑰基礎設施pki框架中同時實現身份認證和授權管理的功能模式,已越來越不適應當代信息社會的發展需求。
  6. Besides, to enforce the security of authentication process, in this thesis we propose the design and implementation of a passwd checker and mandatary identification and authentication mechanism in ercist 4. 0 secure operating system

    本文還介紹了安勝4 . 0安全操作系統中口令檢查器和強身份認證機制的設計和實現,以增強鑒別過程的安全性。
  7. On the whole, bb84 + quantum cryptographic key distribution project is far from a termless absolute secure one in the perspective of theory, because the efficiency is enhanced on the sacrifice of security decreased. what ' s more, some works are done to strengthen the cryptograph in the field of identity authentication and other sectors, and the enhancement of efficiency strongly supports the cryptograph

    綜合來看, bb84 +量子密鑰分配方案並不是一個理論上無條件絕對安全的方案,他在安全性能上的降低得到的代價卻是效率的極大提高,並且此方案在身份認證和其他環節上對其有所降低的安全性能作了保密加強的工作。
  8. The system was designed by dynamic asp ( active server page ), secure socket layer, digital signature and certification technologies

    系統應用了動態asp技術和數據庫技術、安全套接字協議、數字簽名和身份認證技術。
  9. Topmost security for remote access to your office vpn via authentification

    保安遠端登入公司vpn身份認證
  10. This technology will be widely used in case - solving, public security and identity authentification

    該技術在刑事案件偵破、安全保衛、身份認證等領域具有較大的實用價值。
  11. The paper abstracts out the palmprint mainline characteristic owing to palmprint image gradation by the gray value characteristic property method, defining the online palmprint characteristic space with the form of the polar coordinate and compressing the dimension, at last we use the neural network to accomplish the design of identification authentication system with the on - line palmprint as the mating algorithm. based on this, a fast and reliable system of identification authentication can be built

    採用基於掌紋圖像灰度特性的方法提取出掌紋的主線特徵,以極坐標的形式定義在線掌紋的特徵空間並降維處理,最後用神經網路作為匹配演算法完成在線掌紋系統的設計,以此為基礎建立了快速、可靠的新型身份認證系統。
  12. As a rapidly evol - ving technology, fingerprint verification has been widely used in the field of criminal identification, and obviously it has the potential to be widely adopted in a very broad range of civilian applications such as banking security

    作為一種飛速發展的技術,指紋識別已經在刑偵領域大顯手,在銀行身份認證等民用領域,這項技術也具有廣闊的應用空間。
  13. Several authentication methods are discussed, and several vpn implementation protocols that include pptp / l2tp protocol, ipsec protocol, socks protocol and mpls protocol are discussed. to implement access vpn, this dissertation use socks protocol, kerberos protocol and domestic cryptographical algorithm

    針對遠程訪問vpn密碼系統的實現,我們採用socks協議做為vpn實現協議,使用kerberos協議來進行身份認證,使用國內專用密碼演算法來進行數據的加解密。
  14. In a word, by integrating the user " s fingerprint identification with the cryptological authentication protocol, a secure, reliable and effective approach to identifying the users in the network environment can be provided

    把以指紋特徵為代表的生物識別技術與基於密碼體制的身份認證協議有機結合,向最終用戶提供一種更加安全、可靠、便捷的身份認證手段,將是成功地實現網路安全和信息系統安全的有效途徑。
  15. As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today ' s communication network. it can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission. our task focuses on studying the key technology in digital signature. the direct goal is to implement digital signature on the basis of dsp

    在現代的數字通信網路中,數字簽名作為數據技術中的一項關鍵技術,可以解決否、偽造、篡改及冒充問題,用來保信息傳輸過程中的完整性,提供信息發送者的身份認證和不可抵賴性。
  16. Too much traditional aid is in the form of so - called technical assistance that often benefits the donor countries more than the recipients. ( south korea ' s help in providing “ smart ” national identity cards is an egregious example. ) besides, the time spent dealing with so many do - good western agencies, each with an aid agenda that almost certainly conflicts or overlaps with others, sorely tests the government of a poor country short of institutional resources

    而其他以所謂技術援助名義的傳統援助項目,實際受益者往往是援助國自,而不是被援助的國家(例如,韓國幫助建立的「智能卡」的國家身份認證系統就是一個很壞的例子) ,此外,數量繁多的所謂國家慈善機構,每一個都是機構繁雜且功能有所重復,對本來就是貧困國家的政府來說,光是接待和應付他們所花費的精力就是不堪重負。
  17. Through analyzing the iris feature and combining with different feature extraction methods, we can realize iris recognition

    通過分析研究虹膜上豐富的紋理特徵,結合不同的特徵提取方法和分類器可以實現虹膜的身份認證
  18. With the development of computer and network, and the rise of email, identity authentication has already haven new applied domains. for example, in the application of network and database, different users possess different warranties, and computers have no human beings " identification ability. hence, identity authentication becomes an insurmountable, but must be solved problem

    隨著計算機和網路的發展、電子郵件的興起,身份認證又有了新的應用領域,例如,在網路和數據庫等計算機應用中,不同用戶擁有不同的權力,而計算機又不具備人的辨識能力,更何況它常常不能直面用戶,所以身份認證就成為一個難以解決但又必需解決的問題。
  19. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰密碼體制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓曲線攻擊演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大素數域上的橢圓曲線的elgamal加解密和數字簽名。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份認證方案。
  20. News reports say the possible deal calls for establishing greater control of the u. s. border with mexico and implementing an identification system for immigrant workers

    新聞說可能的處理方案要求加強美國和墨西哥的邊境監管,簡歷外來人口身份認證系統。
分享友人