「AUTHENTICATION」の共起表現(2語左で並び替え) - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > AUTHENTICATIONの意味・解説 > AUTHENTICATIONに関連した共起表現

「AUTHENTICATION」の共起表現一覧(2語左で並び替え)

該当件数 : 134



Netcare uses a two-factor authentication protocol involving a username/password com
tands for Parallelizable MAC, is a message authentication code algorithm.
OMAC (One-key MAC) is a message authentication code constructed from a block cipher much
MSNP8 introduced a different authentication method, now sending authorization to Micro
It has a flexible authentication system that allows editors to be granted s
d nonces but should then include a message authentication code (MAC), which Alice should check.
A password-based authentication process (in the common example of OpenSSH)
The lack of a Message Authentication Code means that file corruption (accidenta
as a challenge key in a challenge-response authentication protocol.
he two parties to verbally compare a short authentication string to detect a man-in-the-middle attac
The two parties compared a short authentication string to detect a Man-in-the-middle attac
presented by Bob), and Bob will accept the authentication.
After the authentication, The Guardian quoted Ian Champion of the U
ice will start using the site with all the authentication of Mallory.
SAASM allows satellite authentication, over-the-air rekeying, and contingency re
Pageant - an SSH authentication agent for PuTTY, PSCP and Plink;
DomainKeys is an e-mail authentication system designed to verify the DNS domain o
HTTP and Proxy authentication
It implements Digest, NTLM and Kerberos authentication protocols.
ped and delivered smart card and biometric authentication products.
block ciphers, hash functions and message authentication codes (MACs).
A further paper proposed using it as an authentication protocol, which was subsequently broken.
ty-related optional packages, such as Java Authentication and Authorization Service (JAAS), Java Sec
This article is about the attack on authentication systems.
ion on identities, identity attributes and authentication.
It's able to manage the authorisation and authentication of applications users.
ndards such as OAuth authorization, OpenID authentication, XRD metadata discovery, the Portable Cont
atter how basic, into a mobile banking and authentication device.
submission, JavaScript, HTTP basic access authentication, automatic page redirection, and cookies.
r can deal with HTTPS security, basic http authentication, automatic page redirection and other HTTP
; if any of them are required to be secret authentication values or IDs that the attacker can't gues
s called a biometric word list because the authentication depended on the two human users recognizin
onality; the service offers a central user authentication system and thus allows the same users to b
ptography, a Cipher Block Chaining Message Authentication Code, abbreviated CBC-MAC, is a technique
n iTunes 7 was released, Apple changed the authentication scheme again which caused the older versio
based MAC) is a block cipher-based message authentication code algorithm.
ss to the computer by circumventing normal authentication and authorization mechanisms.
ls such as SSL communications, client-side authentication and AES encryption.
cal discourse, the book of the Concept and authentication, 1999
OP over SSL, providing confidentiality and authentication.
nd distribution of securities, custody and authentication of securities, agency of registration and
Data and authentication solutions (6%), including litigation and d
decryption, digital signing/verification, authentication etc.) can be performed.
During the authentication phase, a user is asked to classify his pre
ith the Ministry of Economic Development's Authentication Project, and later a report on the State S
k cipher and creating an efficient message authentication code that is provably reducible in securit
o trust one another through encryption and authentication.
ain function level, two added features are Authentication Mechanism Assurance and Automatic SPN Mana
ted with newer available firmware (pinware authentication and PIN entry), but as with any new piece
RSA identities, allowing for secure authentication.
ure remote password protocol (SRP) for TLS authentication
unctionality, adding support for biometric authentication, as well as smart-card or token-based auth
ring framework provides support for users, authentication and roles.
ec, L2TP or L2TP/IPsec, support for RADIUS authentication in Internet Authentication Service, networ
GnuPG, an OpenPGP card can be used for SSH authentication also.
Burrows-Abadi-Needham logic for analyzing authentication protocols, and his book (with Luca Cardell
es and colleges, and requires some form of authentication by end users.
ne proprietary databases, various forms of authentication are used to verify affiliation with subscr
ommittee chairman of ANACS the grading and authentication service of the ANA.
se includes all the HTTP headers including authentication data and HTTP cookie contents, which are t
HTTP Basic authentication
User identification and authentication during the exchange of data with third par
ure personal electronic identification and authentication.
If the authentication protocol is not carefully designed, the ta
e are things like weaknesses in protocols, authentication strategies, and system modularization.
products, services and infrastructure for authentication and secure digital interactions.
and possibly includes an intermediary for authentication and version matching.
he rule of reason and substitute for it an authentication of belief by the intentness and degree of
thorization/policy provider for JAAS (Java Authentication and Authorization Service).
ites have deployed Zephyr using Kerberos 4 authentication exclusively, though in late 2007, some sit
support (Socks 4,4a,5, http, local) (proxy authentication also supported)
s user behavior with support for login and authentication flavors.
ty provided by WSGI middleware may include authentication, logging, url redirection, creation of ses
Server 2008 in favor of the newer Kerberos authentication protocol.
face to facilitate NTLM challenge-response authentication and to negotiate integrity and confidentia
DenyHosts checks the end of the authentication log for recent failed login attempts.
Little is known about the role of NTLM authentication on MSN Chat.
The use of strong authentication tools simply creates an increased level of
ork at Experian focuses on knowledge-based authentication for fraud prevention.
One-time password authentication with the OTPW package is accomplished via
Optional two-factor authentication using smart cards and/or hardware security
ext Tokens can contain the original client authentication token when sent from the client to the ser
r approach includes two phases---setup and authentication.
rfect Passwords: Selection, Protection and Authentication; Syngress Publishing; ISBN 1-59749-041-5
can also be configured to provide pre-boot authentication through an initrd, thus encrypting all dat
lack of security, ssh supports public key authentication.
visory on Orkut vulnerabilities related to authentication issues.
data distribution, data replication, user authentication and user access control, further lowering
ce they permit the analysis of secrecy and authentication properties.
not provide a strong level of security as authentication may be difficult to establish and secure c
ons in enterprise-wide security, including authentication, digital certificates, intrusion detection
NS or Domain Name System Servers, (Network Authentication, Network Shares, Network Resources, Email
Documents, this procedure is simply called authentication instead of apostille.
ad jurisdiction in actions of slander, the authentication of tutorial and curatorial inventories, ac
Also note that "Windows Authentication" should be used (as opposed to SQL Server
PKI support provided for SSL X.509 Authentication, WS-Security Signatures, and WS-Security E
nerability, by introducing stronger caller authentication factors than the human-operated help desk
It supports password authentication and digital certificate authentication.
It also supports fewer authentication protocols than fetchmail.
DEA, TestLink, TestRail, and supports user authentication with Google Account, Yahoo!, OpenID and LD
stem encryption, using the system's domain authentication secrets.
AFE cryptography libraries and the SecurID authentication token.
Services are provided using srvx; the user authentication service is named AuthServ and the channel
The Product Authentication Inspectorate Ltd has set a standard for Do
witches/routers/VPN systems and the Policy authentication (AD server/certificate server/802.1x),
vulnerable to virus attacks and the like; authentication and challenges are made part of the specif
sion-critical environments where the quick authentication of a high number of individuals from many
The system itself manages the user authentication, payment processing, administration and th
his circumvented the need to pass the SASL authentication challenge (GateKeeperPassport on MSN Chat)
d-winning speeches about Java, the Central Authentication Service, and other topics at industry conf
anning group, there developing the Central Authentication Service in "one week using a text editor."
versight of all Notaries Public, the legal authentication of documents, maintaining oversight and re
This imperial authentication of the painting meant that no-one seriousl
such as SSL/PKI and/or Two or Three Factor Authentication solutions are in place.
launches ASUS WebStorage One Time Password Authentication (ASUS WebStorage OTP Authentication) to pr
practically amounts to challenge-response authentication.
S uses a cracked DVD player key to perform authentication, libdvdcss uses a generated list of possib
ocol cannot be effectively used to provide authentication, although it can ensure that no third part
ntegrates Spring, ACEGI, Dojo Toolkit 1.0, authentication, LDAP, ActiveDirectory and POJOs and their
Twitter's OAuth ( authentication protocol) allowed instant registration for
used in conjunction with common two factor authentication schemes utilized in ATM, debit/retail poin
igurations when PAM is the underlying host authentication provider to effectively provide password a
metimes, board portals will use two-factor authentication for user logins, role-based access control
IRCX defines ways to use SASL authentication to authenticate securely to the server, ch
icult to counterfeit and is often used for authentication purposes.
other computers (optionally using password authentication); this mechanism allows one person to mana
schema validation, encryption/decryption, authentication, signing, data transformation and protocol
riginal user password, ASUS WebStorage OTP Authentication provides double protection for all persona
NTLMSSP is used wherever SSPI authentication is used including, but not limited to, Ser
AuthServ, which provides authentication for other services on the network and allo
putes, identification of wildlife remains, authentication of plants and seeds besides a battery of m
stem and bootable partitions with pre-boot authentication.
luminum foil that permits stamping with an authentication seal and serial number.
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS