「AUTHENTICATION」の共起表現(1語右で並び替え) - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > AUTHENTICATIONの意味・解説 > AUTHENTICATIONに関連した共起表現

「AUTHENTICATION」の共起表現一覧(1語右で並び替え)

該当件数 : 133



Pageant - an SSH authentication agent for PuTTY, PSCP and Plink;
support (Socks 4,4a,5, http, local) (proxy authentication also supported)
GnuPG, an OpenPGP card can be used for SSH authentication also.
ocol cannot be effectively used to provide authentication, although it can ensure that no third part
User authentication and authorisation
It supports password authentication and digital certificate authentication.
Authorizer - provides authentication and authorization facilities.
ls such as SSL communications, client-side authentication and AES encryption.
ring framework provides support for users, authentication and roles.
thorization/policy provider for JAAS (Java Authentication and Authorization Service).
Also note that "Windows Authentication" should be used (as opposed to SQL Server
ty-related optional packages, such as Java Authentication and Authorization Service (JAAS), Java Sec
products, services and infrastructure for authentication and secure digital interactions.
vulnerable to virus attacks and the like; authentication and challenges are made part of the specif
ss to the computer by circumventing normal authentication and authorization mechanisms.
and possibly includes an intermediary for authentication and version matching.
face to facilitate NTLM challenge-response authentication and to negotiate integrity and confidentia
data distribution, data replication, user authentication and user access control, further lowering
ted with newer available firmware (pinware authentication and PIN entry), but as with any new piece
only used on many websites (including user authentication and permissions, object lifecycles and aja
ne proprietary databases, various forms of authentication are used to verify affiliation with subscr
unctionality, adding support for biometric authentication, as well as smart-card or token-based auth
submission, JavaScript, HTTP basic access authentication, automatic page redirection, and cookies.
r can deal with HTTPS security, basic http authentication, automatic page redirection and other HTTP
Authentication, by definition, is concerned with the vali
es and colleges, and requires some form of authentication by end users.
his circumvented the need to pass the SASL authentication challenge (GateKeeperPassport on MSN Chat)
based MAC) is a block cipher-based message authentication code algorithm.
tands for Parallelizable MAC, is a message authentication code algorithm.
OMAC (One-key MAC) is a message authentication code constructed from a block cipher much
d nonces but should then include a message authentication code (MAC), which Alice should check.
k cipher and creating an efficient message authentication code that is provably reducible in securit
The lack of a Message Authentication Code means that file corruption (accidenta
ptography, a Cipher Block Chaining Message Authentication Code, abbreviated CBC-MAC, is a technique
block ciphers, hash functions and message authentication codes (MACs).
se includes all the HTTP headers including authentication data and HTTP cookie contents, which are t
s called a biometric word list because the authentication depended on the two human users recognizin
atter how basic, into a mobile banking and authentication device.
ons in enterprise-wide security, including authentication, digital certificates, intrusion detection
User identification and authentication during the exchange of data with third par
decryption, digital signing/verification, authentication etc.) can be performed.
ites have deployed Zephyr using Kerberos 4 authentication exclusively, though in late 2007, some sit
nerability, by introducing stronger caller authentication factors than the human-operated help desk
s user behavior with support for login and authentication flavors.
ork at Experian focuses on knowledge-based authentication for fraud prevention.
AuthServ, which provides authentication for other services on the network and allo
metimes, board portals will use two-factor authentication for user logins, role-based access control
Authentication: How will each party prove its identity to
ec, L2TP or L2TP/IPsec, support for RADIUS authentication in Internet Authentication Service, networ
The Product Authentication Inspectorate Ltd has set a standard for Do
Documents, this procedure is simply called authentication instead of apostille.
Product Authentication International
NTLMSSP is used wherever SSPI authentication is used including, but not limited to, Ser
Authentication is being performed not only for user login
This authentication is done in order to perform digital signin
visory on Orkut vulnerabilities related to authentication issues.
ntegrates Spring, ACEGI, Dojo Toolkit 1.0, authentication, LDAP, ActiveDirectory and POJOs and their
S uses a cracked DVD player key to perform authentication, libdvdcss uses a generated list of possib
DenyHosts checks the end of the authentication log for recent failed login attempts.
ty provided by WSGI middleware may include authentication, logging, url redirection, creation of ses
not provide a strong level of security as authentication may be difficult to establish and secure c
ain function level, two added features are Authentication Mechanism Assurance and Automatic SPN Mana
various authentication method (SSO, LDAP, X.509)
MSNP8 introduced a different authentication method, now sending authorization to Micro
ad undergone some changes too (details and authentication needed).
NS or Domain Name System Servers, (Network Authentication, Network Shares, Network Resources, Email
It's able to manage the authorisation and authentication of applications users.
ice will start using the site with all the authentication of Mallory.
This imperial authentication of the painting meant that no-one seriousl
sion-critical environments where the quick authentication of a high number of individuals from many
ad jurisdiction in actions of slander, the authentication of tutorial and curatorial inventories, ac
nd distribution of securities, custody and authentication of securities, agency of registration and
versight of all Notaries Public, the legal authentication of documents, maintaining oversight and re
putes, identification of wildlife remains, authentication of plants and seeds besides a battery of m
he rule of reason and substitute for it an authentication of belief by the intentness and degree of
Little is known about the role of NTLM authentication on MSN Chat.
Windows authentication or integrated database authentication
SAASM allows satellite authentication, over-the-air rekeying, and contingency re
The system itself manages the user authentication, payment processing, administration and th
During the authentication phase, a user is asked to classify his pre
A password-based authentication process (in the common example of OpenSSH)
ADAPT (Active Directory Authentication Processing Tool)
ped and delivered smart card and biometric authentication products.
ith the Ministry of Economic Development's Authentication Project, and later a report on the State S
ce they permit the analysis of secrecy and authentication properties.
Netcare uses a two-factor authentication protocol involving a username/password com
If the authentication protocol is not carefully designed, the ta
Twitter's OAuth ( authentication protocol) allowed instant registration for
A further paper proposed using it as an authentication protocol, which was subsequently broken.
Server 2008 in favor of the newer Kerberos authentication protocol.
as a challenge key in a challenge-response authentication protocol.
It also supports fewer authentication protocols than fetchmail.
Burrows-Abadi-Needham logic for analyzing authentication protocols, and his book (with Luca Cardell
It implements Digest, NTLM and Kerberos authentication protocols.
igurations when PAM is the underlying host authentication provider to effectively provide password a
riginal user password, ASUS WebStorage OTP Authentication provides double protection for all persona
icult to counterfeit and is often used for authentication purposes.
hester bombing on 2011-06-08 03:55:53, 401 Authentication Required
n iTunes 7 was released, Apple changed the authentication scheme again which caused the older versio
used in conjunction with common two factor authentication schemes utilized in ATM, debit/retail poin
luminum foil that permits stamping with an authentication seal and serial number.
stem encryption, using the system's domain authentication secrets.
Services are provided using srvx; the user authentication service is named AuthServ and the channel
ommittee chairman of ANACS the grading and authentication service of the ANA.
anning group, there developing the Central Authentication Service in "one week using a text editor."
d-winning speeches about Java, the Central Authentication Service, and other topics at industry conf
schema validation, encryption/decryption, authentication, signing, data transformation and protocol
Data and authentication solutions (6%), including litigation and d
such as SSL/PKI and/or Two or Three Factor Authentication solutions are in place.
e are things like weaknesses in protocols, authentication strategies, and system modularization.
he two parties to verbally compare a short authentication string to detect a man-in-the-middle attac
The two parties compared a short authentication string to detect a Man-in-the-middle attac
Built-in authentication support (via ACL)
rfect Passwords: Selection, Protection and Authentication; Syngress Publishing; ISBN 1-59749-041-5
It has a flexible authentication system that allows editors to be granted s
DomainKeys is an e-mail authentication system designed to verify the DNS domain o
onality; the service offers a central user authentication system and thus allows the same users to b
This article is about the attack on authentication systems.
Authentication takes place on UDP port 153.
After the authentication, The Guardian quoted Ian Champion of the U
other computers (optionally using password authentication); this mechanism allows one person to mana
can also be configured to provide pre-boot authentication through an initrd, thus encrypting all dat
IRCX defines ways to use SASL authentication to authenticate securely to the server, ch
ext Tokens can contain the original client authentication token when sent from the client to the ser
AFE cryptography libraries and the SecurID authentication token.
The use of strong authentication tools simply creates an increased level of
Optional two-factor authentication using smart cards and/or hardware security
; if any of them are required to be secret authentication values or IDs that the attacker can't gues
One-time password authentication with the OTPW package is accomplished via
DEA, TestLink, TestRail, and supports user authentication with Google Account, Yahoo!, OpenID and LD
PKI support provided for SSL X.509 Authentication, WS-Security Signatures, and WS-Security E
ndards such as OAuth authorization, OpenID authentication, XRD metadata discovery, the Portable Cont
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS