「AUTHENTICATION」の共起表現一覧(1語右で並び替え)
該当件数 : 133件
Pageant - an SSH | authentication agent for PuTTY, PSCP and Plink; |
support (Socks 4,4a,5, http, local) (proxy | authentication also supported) |
GnuPG, an OpenPGP card can be used for SSH | authentication also. |
ocol cannot be effectively used to provide | authentication, although it can ensure that no third part |
User | authentication and authorisation |
It supports password | authentication and digital certificate authentication. |
Authorizer - provides | authentication and authorization facilities. |
ls such as SSL communications, client-side | authentication and AES encryption. |
ring framework provides support for users, | authentication and roles. |
thorization/policy provider for JAAS (Java | Authentication and Authorization Service). |
Also note that "Windows | Authentication" should be used (as opposed to SQL Server |
ty-related optional packages, such as Java | Authentication and Authorization Service (JAAS), Java Sec |
products, services and infrastructure for | authentication and secure digital interactions. |
vulnerable to virus attacks and the like; | authentication and challenges are made part of the specif |
ss to the computer by circumventing normal | authentication and authorization mechanisms. |
and possibly includes an intermediary for | authentication and version matching. |
face to facilitate NTLM challenge-response | authentication and to negotiate integrity and confidentia |
data distribution, data replication, user | authentication and user access control, further lowering |
ted with newer available firmware (pinware | authentication and PIN entry), but as with any new piece |
only used on many websites (including user | authentication and permissions, object lifecycles and aja |
ne proprietary databases, various forms of | authentication are used to verify affiliation with subscr |
unctionality, adding support for biometric | authentication, as well as smart-card or token-based auth |
submission, JavaScript, HTTP basic access | authentication, automatic page redirection, and cookies. |
r can deal with HTTPS security, basic http | authentication, automatic page redirection and other HTTP |
Authentication, by definition, is concerned with the vali | |
es and colleges, and requires some form of | authentication by end users. |
his circumvented the need to pass the SASL | authentication challenge (GateKeeperPassport on MSN Chat) |
based MAC) is a block cipher-based message | authentication code algorithm. |
tands for Parallelizable MAC, is a message | authentication code algorithm. |
OMAC (One-key MAC) is a message | authentication code constructed from a block cipher much |
d nonces but should then include a message | authentication code (MAC), which Alice should check. |
k cipher and creating an efficient message | authentication code that is provably reducible in securit |
The lack of a Message | Authentication Code means that file corruption (accidenta |
ptography, a Cipher Block Chaining Message | Authentication Code, abbreviated CBC-MAC, is a technique |
block ciphers, hash functions and message | authentication codes (MACs). |
se includes all the HTTP headers including | authentication data and HTTP cookie contents, which are t |
s called a biometric word list because the | authentication depended on the two human users recognizin |
atter how basic, into a mobile banking and | authentication device. |
ons in enterprise-wide security, including | authentication, digital certificates, intrusion detection |
User identification and | authentication during the exchange of data with third par |
decryption, digital signing/verification, | authentication etc.) can be performed. |
ites have deployed Zephyr using Kerberos 4 | authentication exclusively, though in late 2007, some sit |
nerability, by introducing stronger caller | authentication factors than the human-operated help desk |
s user behavior with support for login and | authentication flavors. |
ork at Experian focuses on knowledge-based | authentication for fraud prevention. |
AuthServ, which provides | authentication for other services on the network and allo |
metimes, board portals will use two-factor | authentication for user logins, role-based access control |
Authentication: How will each party prove its identity to | |
ec, L2TP or L2TP/IPsec, support for RADIUS | authentication in Internet Authentication Service, networ |
The Product | Authentication Inspectorate Ltd has set a standard for Do |
Documents, this procedure is simply called | authentication instead of apostille. |
Product | Authentication International |
NTLMSSP is used wherever SSPI | authentication is used including, but not limited to, Ser |
Authentication is being performed not only for user login | |
This | authentication is done in order to perform digital signin |
visory on Orkut vulnerabilities related to | authentication issues. |
ntegrates Spring, ACEGI, Dojo Toolkit 1.0, | authentication, LDAP, ActiveDirectory and POJOs and their |
S uses a cracked DVD player key to perform | authentication, libdvdcss uses a generated list of possib |
DenyHosts checks the end of the | authentication log for recent failed login attempts. |
ty provided by WSGI middleware may include | authentication, logging, url redirection, creation of ses |
not provide a strong level of security as | authentication may be difficult to establish and secure c |
ain function level, two added features are | Authentication Mechanism Assurance and Automatic SPN Mana |
various | authentication method (SSO, LDAP, X.509) |
MSNP8 introduced a different | authentication method, now sending authorization to Micro |
ad undergone some changes too (details and | authentication needed). |
NS or Domain Name System Servers, (Network | Authentication, Network Shares, Network Resources, Email |
It's able to manage the authorisation and | authentication of applications users. |
ice will start using the site with all the | authentication of Mallory. |
This imperial | authentication of the painting meant that no-one seriousl |
sion-critical environments where the quick | authentication of a high number of individuals from many |
ad jurisdiction in actions of slander, the | authentication of tutorial and curatorial inventories, ac |
nd distribution of securities, custody and | authentication of securities, agency of registration and |
versight of all Notaries Public, the legal | authentication of documents, maintaining oversight and re |
putes, identification of wildlife remains, | authentication of plants and seeds besides a battery of m |
he rule of reason and substitute for it an | authentication of belief by the intentness and degree of |
Little is known about the role of NTLM | authentication on MSN Chat. |
Windows | authentication or integrated database authentication |
SAASM allows satellite | authentication, over-the-air rekeying, and contingency re |
The system itself manages the user | authentication, payment processing, administration and th |
During the | authentication phase, a user is asked to classify his pre |
A password-based | authentication process (in the common example of OpenSSH) |
ADAPT (Active Directory | Authentication Processing Tool) |
ped and delivered smart card and biometric | authentication products. |
ith the Ministry of Economic Development's | Authentication Project, and later a report on the State S |
ce they permit the analysis of secrecy and | authentication properties. |
Netcare uses a two-factor | authentication protocol involving a username/password com |
If the | authentication protocol is not carefully designed, the ta |
Twitter's OAuth ( | authentication protocol) allowed instant registration for |
A further paper proposed using it as an | authentication protocol, which was subsequently broken. |
Server 2008 in favor of the newer Kerberos | authentication protocol. |
as a challenge key in a challenge-response | authentication protocol. |
It also supports fewer | authentication protocols than fetchmail. |
Burrows-Abadi-Needham logic for analyzing | authentication protocols, and his book (with Luca Cardell |
It implements Digest, NTLM and Kerberos | authentication protocols. |
igurations when PAM is the underlying host | authentication provider to effectively provide password a |
riginal user password, ASUS WebStorage OTP | Authentication provides double protection for all persona |
icult to counterfeit and is often used for | authentication purposes. |
hester bombing on 2011-06-08 03:55:53, 401 | Authentication Required |
n iTunes 7 was released, Apple changed the | authentication scheme again which caused the older versio |
used in conjunction with common two factor | authentication schemes utilized in ATM, debit/retail poin |
luminum foil that permits stamping with an | authentication seal and serial number. |
stem encryption, using the system's domain | authentication secrets. |
Services are provided using srvx; the user | authentication service is named AuthServ and the channel |
ommittee chairman of ANACS the grading and | authentication service of the ANA. |
anning group, there developing the Central | Authentication Service in "one week using a text editor." |
d-winning speeches about Java, the Central | Authentication Service, and other topics at industry conf |
schema validation, encryption/decryption, | authentication, signing, data transformation and protocol |
Data and | authentication solutions (6%), including litigation and d |
such as SSL/PKI and/or Two or Three Factor | Authentication solutions are in place. |
e are things like weaknesses in protocols, | authentication strategies, and system modularization. |
he two parties to verbally compare a short | authentication string to detect a man-in-the-middle attac |
The two parties compared a short | authentication string to detect a Man-in-the-middle attac |
Built-in | authentication support (via ACL) |
rfect Passwords: Selection, Protection and | Authentication; Syngress Publishing; ISBN 1-59749-041-5 |
It has a flexible | authentication system that allows editors to be granted s |
DomainKeys is an e-mail | authentication system designed to verify the DNS domain o |
onality; the service offers a central user | authentication system and thus allows the same users to b |
This article is about the attack on | authentication systems. |
Authentication takes place on UDP port 153. | |
After the | authentication, The Guardian quoted Ian Champion of the U |
other computers (optionally using password | authentication); this mechanism allows one person to mana |
can also be configured to provide pre-boot | authentication through an initrd, thus encrypting all dat |
IRCX defines ways to use SASL | authentication to authenticate securely to the server, ch |
ext Tokens can contain the original client | authentication token when sent from the client to the ser |
AFE cryptography libraries and the SecurID | authentication token. |
The use of strong | authentication tools simply creates an increased level of |
Optional two-factor | authentication using smart cards and/or hardware security |
; if any of them are required to be secret | authentication values or IDs that the attacker can't gues |
One-time password | authentication with the OTPW package is accomplished via |
DEA, TestLink, TestRail, and supports user | authentication with Google Account, Yahoo!, OpenID and LD |
PKI support provided for SSL X.509 | Authentication, WS-Security Signatures, and WS-Security E |
ndards such as OAuth authorization, OpenID | authentication, XRD metadata discovery, the Portable Cont |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |