• Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.

    深度防御可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵机器问题

    youdao

  • Finally, there is strong authentication in which an identity is verified using two or more methods, such as a password and a cryptographic key.

    最后身份验证其中使用两种或者更多方法对一个标识进行验证,密码加密密钥。

    youdao

  • Every time cryptographic authentication is to be used, a password must be given in order to decode the key.

    每次使用密码认证时,必须给出一个密码解码密钥

    youdao

  • A ticket is provided by an authentication server to the client using a cryptographic key of the intended server.

    身份验证服务器使用目标服务器的一个密码密钥将票据提供客户端。

    youdao

  • The PAGKA protocol suite is communication efficient, and has the following cryptographic properties such as key independence, implicit key authentication, perfect forward secrecy and resistance .

    通过引入群公钥证书密钥中结合群以及成员的长期密钥和临时密钥,提供了隐含密钥认证,以有效地对抗中间人攻击。

    youdao

  • This property identifies all cryptographic functions involved in creating an XML digital signature, including hashing, public key algorithms, Message Authentication Codes (MACs), and padding.

    属性标识创建XML数字签名时涉及到的所有加密功能包括哈希算法公钥算法消息身份验证代码(MAC)填充。

    youdao

  • This property identifies all cryptographic functions involved in creating an XML digital signature, including hashing, public key algorithms, Message Authentication Codes (MACs), and padding.

    属性标识创建XML数字签名时涉及到的所有加密功能包括哈希算法公钥算法消息身份验证代码(MAC)填充。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定