authentication methods 中文意思是什麼

authentication methods 解釋
身份驗證方法
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  • methods : (方法):是指定給對象的函數。在函數被指定給對象之後,該函數就可以被稱為是該對象的方法。
  1. Several authentication methods are discussed, and several vpn implementation protocols that include pptp / l2tp protocol, ipsec protocol, socks protocol and mpls protocol are discussed. to implement access vpn, this dissertation use socks protocol, kerberos protocol and domestic cryptographical algorithm

    針對遠程訪問vpn密碼系統的實現,我們採用socks協議做為vpn實現協議,使用kerberos協議來進行身份認證,使用國內專用密碼演算法來進行數據的加解密。
  2. Since prof. haken introduced synergetics methods to pattern recognition, lots of researches have been kept on investigating. synergetic recognition theory has been applied to pattern recognition and many other fields. biometrics techniques are considered as the best person authentication method, but there is lots of work to be done

    模式識別的協同學方法自haken教授提出以來,作為一種嶄新的模式識別方法,人們進行了廣泛的理論與應用研究,協同識別理論已被成功的應用於模式識別等諸多領域。
  3. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  4. So why is this better than other biometric authentication methods like fingerprinting or facial recognition

    那麼,虹膜掃描技術為什麼比指紋及臉部識別等其他利用生物技術辨別真偽的方法要好呢?
  5. The system performs the following basic functions in order to meet the requirements : provide security methods for interbank payments through internet, atm, telephone banking service etc. for customers ; provide mechanisms to enable the secure authentication of parties in the transaction ; provide access to multiple bank payment processing systems with one protocol ; transform a payment request into a bank payment transaction ; provide information for audit and control

    該系統的主要功能是為用戶提供網上支付、 atm 、電話銀行等安全支付方式;在交易中提供對交易雙方的安全認證方式;支持多種銀行支付處理系統;把支付請求轉化為銀行內部支付交易;提供審計和控制信息。
  6. First, this paper introduces the notation, categories and properties of security protocols, and formal methods to verify security protocols and small system model. the emphasis is the research and analysis of the principle of the model checking method. we study the mechanism and syntax of symbolic model checking tool smv, model check the authentication version of needham - schroeder public key protocol and woo and lam ij symmetric key protocol

    文章主要介紹了安全協議的概念、分類和性質,安全協議的形式化驗證方法,以及小系統模型的原理;重點分析和研究了符號化模型檢驗工具smv的原理和語法及其對安全協議進行模型檢驗時的工作機理,而且使用smv對needham - schroeder公鑰協議和wooandlam對稱鑰協議進行了形式化建模與模型檢驗,發現了它們的安全漏洞。
  7. We research different kinds of formal methods, particularly study the mechanism of symbolic model checking tool smv, and finally we decide to adopt smv as the tool for the model checking of security protocols. with smv, we model check the authentication version of needham - schroeder public key protocol and woo and lam ij symmetric key protocol

    本文研究了驗證安全協議的各種形式化方法,詳細研究了符號化模型檢驗工具smv的工作機制;確定了使用smv作為工具對安全協議進行模型檢驗,驗證了認證版needham - schroeder公鑰協議和wooandlam對稱鑰協議。
  8. The following table describes the authentication methods that are supported by asp. net

    下表說明了asp . net支持的身份驗證方法。
  9. For more information on remoting security and authentication methods, see

    有關遠程處理安全性和身份驗證方法的更多信息,請參見「
  10. Use http authentication methods to establish an authenticated connection to an http server

    使用http身份驗證方法建立與http服務器的已驗證連接
  11. It was no easy task to find two - factor authentication methods that would be tamper - proof and fail - safe, given the ability of criminals to find ever new ways of exploiting the authentication system

    所謂道高一尺,魔高一丈,不法之徒總可找到繞過認證系統的新方法,我們要物色既可防干擾又萬無一失的雙重認證方法,並不容易。
  12. Vpn is the technology of building a intranet based on the public network with the support of tunneling technology, encapsulation and authentication methods

    虛擬專用網( vpn )是採用隧道技術以及加密、身份認證等方法,在公共網路上構建企業網路的技術。
  13. It is thus understandable that the general public and the businesses would prefer using simpler authentication methods such as one - time password or pin

    因此,一般市民及企業選擇使用如一次性密碼或個人辨認號碼等較簡單的認證方法,這點是可以理解的。
  14. It also supports the new extensible authentication protocol to enable vendor - provided authentication methods for remote clients ( such as retina scan )

    它也支持新的可擴展身份驗證協議,從而使遠程客戶端能夠使用供應商提供的身份驗證方法(如「 retinascan 」 ) 。
  15. In order to solve the problems of current source authentication methods, this thesis brings forward a new source authentication scheme based on the events sequence - - - - esa ( events sequence authentication ). this scheme does not depend on the time synchronous mechanism, and it has the advantages of fast authentication and

    根據現有源認證方法的不足和存在問題,本文提出了基於事件序列的源認證方案esa ( eventssequenceauthentication ) ,該方案不依賴時間同步機制,具有快速認證,抗丟失性和擴展性較好的特點。
  16. This thesis detailedly researches into source authentication, introducing and analyzing some previous source authentication methods. it analyzes a source authentication method ( tesla ) which is being paid more and more attention nowadays, its function, shortcoming and current improvement, and points out its secure vulnerability. we draw a conclusion : though tesla has many advantages, such as the low communication cost, tolerance of pack loss, there are still many problems, which mostly arise from the requirement of synchronous time

    並對其中一種目前廣泛受到人們關注的源認證方法tesla協議進行了研究,包括對tesla的功能、原理、缺陷以及現有的改進做了分析,指出其中的安全漏洞,並得到以下結論:盡管tesla有許多優點,如低通訊成本,較好的抗丟失性,但它仍然存在許多難以克服的缺陷,而這些問題主要是由於tesla所依賴的時間同步機制在現有網路環境下不易實現所帶來的。
  17. Q2. what authentication methods do govhk online services use

    Q2 .香港政府一站通網上服務使用哪種認證方式?
  18. The traditional personal authentication methods cannot keep up with the requirements of the society because of their inherent defects. under such circumstance, biometrics emerged as the time requires

    傳統的身份識別方法由於其自身固有的缺點已經不能滿足社會發展的要求,生物特徵識別技術應運而生。
  19. It addresses the determination of a party ' s location in an electronic environment ; the time and place of dispatch and receipt of electronic communications ; the use of automated message systems for contract formation ; and the criteria to be used for establishing functional equivalence between electronic communications and paper documents - - including " original " paper documents - - as well as between electronic authentication methods and hand - written signatures

    公約處理的問題包括如何確定一方當事人在電子環境中的所在地;電子通信的收發時間和地點;使用自動信息系統訂立合同;以及確立電子通信和紙面文件(包括"原始"紙面文件)以及電子認證方法和手寫簽名功能上等同所使用的標準。
  20. Linux, which is increasingly popular, provides several system user authentication methods, including local files, nis, ldap, and the pam mechanism

    近來流行的linux提供了一些系統用戶驗證方法,包括本地文件、 nis 、 ldap和pam機制。
分享友人