「AUTHENTICATION」の共起表現一覧(2語右で並び替え)
該当件数 : 112件
During the | authentication phase, a user is asked to classify his pre |
sion-critical environments where the quick | authentication of a high number of individuals from many |
ptography, a Cipher Block Chaining Message | Authentication Code, abbreviated CBC-MAC, is a technique |
ntegrates Spring, ACEGI, Dojo Toolkit 1.0, | authentication, LDAP, ActiveDirectory and POJOs and their |
Also note that "Windows | Authentication" should be used (as opposed to SQL Server |
ls such as SSL communications, client-side | authentication and AES encryption. |
n iTunes 7 was released, Apple changed the | authentication scheme again which caused the older versio |
based MAC) is a block cipher-based message | authentication code algorithm. |
tands for Parallelizable MAC, is a message | authentication code algorithm. |
Twitter's OAuth ( | authentication protocol) allowed instant registration for |
can also be configured to provide pre-boot | authentication through an initrd, thus encrypting all dat |
e are things like weaknesses in protocols, | authentication strategies, and system modularization. |
luminum foil that permits stamping with an | authentication seal and serial number. |
se includes all the HTTP headers including | authentication data and HTTP cookie contents, which are t |
onality; the service offers a central user | authentication system and thus allows the same users to b |
d-winning speeches about Java, the Central | Authentication Service, and other topics at industry conf |
Burrows-Abadi-Needham logic for analyzing | authentication protocols, and his book (with Luca Cardell |
ith the Ministry of Economic Development's | Authentication Project, and later a report on the State S |
It's able to manage the authorisation and | authentication of applications users. |
such as SSL/PKI and/or Two or Three Factor | Authentication solutions are in place. |
ain function level, two added features are | Authentication Mechanism Assurance and Automatic SPN Mana |
IRCX defines ways to use SASL | authentication to authenticate securely to the server, ch |
User | authentication and authorisation |
Authorizer - provides | authentication and authorization facilities. |
thorization/policy provider for JAAS (Java | Authentication and Authorization Service). |
ty-related optional packages, such as Java | Authentication and Authorization Service (JAAS), Java Sec |
ss to the computer by circumventing normal | authentication and authorization mechanisms. |
not provide a strong level of security as | authentication may be difficult to establish and secure c |
Authentication is being performed not only for user login | |
he rule of reason and substitute for it an | authentication of belief by the intentness and degree of |
decryption, digital signing/verification, | authentication etc.) can be performed. |
ons in enterprise-wide security, including | authentication, digital certificates, intrusion detection |
vulnerable to virus attacks and the like; | authentication and challenges are made part of the specif |
OMAC (One-key MAC) is a message | authentication code constructed from a block cipher much |
schema validation, encryption/decryption, | authentication, signing, data transformation and protocol |
Authentication, by definition, is concerned with the vali | |
DomainKeys is an e-mail | authentication system designed to verify the DNS domain o |
It supports password | authentication and digital certificate authentication. |
versight of all Notaries Public, the legal | authentication of documents, maintaining oversight and re |
This | authentication is done in order to perform digital signin |
riginal user password, ASUS WebStorage OTP | Authentication provides double protection for all persona |
es and colleges, and requires some form of | authentication by end users. |
Pageant - an SSH | authentication agent for PuTTY, PSCP and Plink; |
DenyHosts checks the end of the | authentication log for recent failed login attempts. |
ork at Experian focuses on knowledge-based | authentication for fraud prevention. |
DEA, TestLink, TestRail, and supports user | authentication with Google Account, Yahoo!, OpenID and LD |
After the | authentication, The Guardian quoted Ian Champion of the U |
anning group, there developing the Central | Authentication Service in "one week using a text editor." |
Windows | authentication or integrated database authentication |
ec, L2TP or L2TP/IPsec, support for RADIUS | authentication in Internet Authentication Service, networ |
Netcare uses a two-factor | authentication protocol involving a username/password com |
Services are provided using srvx; the user | authentication service is named AuthServ and the channel |
If the | authentication protocol is not carefully designed, the ta |
ocol cannot be effectively used to provide | authentication, although it can ensure that no third part |
The Product | Authentication Inspectorate Ltd has set a standard for Do |
ice will start using the site with all the | authentication of Mallory. |
The lack of a Message | Authentication Code means that file corruption (accidenta |
other computers (optionally using password | authentication); this mechanism allows one person to mana |
ndards such as OAuth authorization, OpenID | authentication, XRD metadata discovery, the Portable Cont |
Little is known about the role of NTLM | authentication on MSN Chat. |
MSNP8 introduced a different | authentication method, now sending authorization to Micro |
ommittee chairman of ANACS the grading and | authentication service of the ANA. |
Documents, this procedure is simply called | authentication instead of apostille. |
s called a biometric word list because the | authentication depended on the two human users recognizin |
; if any of them are required to be secret | authentication values or IDs that the attacker can't gues |
AuthServ, which provides | authentication for other services on the network and allo |
submission, JavaScript, HTTP basic access | authentication, automatic page redirection, and cookies. |
r can deal with HTTPS security, basic http | authentication, automatic page redirection and other HTTP |
only used on many websites (including user | authentication and permissions, object lifecycles and aja |
ted with newer available firmware (pinware | authentication and PIN entry), but as with any new piece |
Authentication takes place on UDP port 153. | |
putes, identification of wildlife remains, | authentication of plants and seeds besides a battery of m |
The system itself manages the user | authentication, payment processing, administration and th |
rfect Passwords: Selection, Protection and | Authentication; Syngress Publishing; ISBN 1-59749-041-5 |
SAASM allows satellite | authentication, over-the-air rekeying, and contingency re |
ring framework provides support for users, | authentication and roles. |
products, services and infrastructure for | authentication and secure digital interactions. |
nd distribution of securities, custody and | authentication of securities, agency of registration and |
witches/routers/VPN systems and the Policy | authentication (AD server/certificate server/802.1x), |
NS or Domain Name System Servers, (Network | Authentication, Network Shares, Network Resources, Email |
PKI support provided for SSL X.509 | Authentication, WS-Security Signatures, and WS-Security E |
The use of strong | authentication tools simply creates an increased level of |
Optional two-factor | authentication using smart cards and/or hardware security |
support (Socks 4,4a,5, http, local) (proxy | authentication also supported) |
It also supports fewer | authentication protocols than fetchmail. |
nerability, by introducing stronger caller | authentication factors than the human-operated help desk |
It has a flexible | authentication system that allows editors to be granted s |
k cipher and creating an efficient message | authentication code that is provably reducible in securit |
One-time password | authentication with the OTPW package is accomplished via |
User identification and | authentication during the exchange of data with third par |
This imperial | authentication of the painting meant that no-one seriousl |
ites have deployed Zephyr using Kerberos 4 | authentication exclusively, though in late 2007, some sit |
igurations when PAM is the underlying host | authentication provider to effectively provide password a |
he two parties to verbally compare a short | authentication string to detect a man-in-the-middle attac |
The two parties compared a short | authentication string to detect a Man-in-the-middle attac |
face to facilitate NTLM challenge-response | authentication and to negotiate integrity and confidentia |
ADAPT (Active Directory | Authentication Processing Tool) |
ad jurisdiction in actions of slander, the | authentication of tutorial and curatorial inventories, ac |
ty provided by WSGI middleware may include | authentication, logging, url redirection, creation of ses |
NTLMSSP is used wherever SSPI | authentication is used including, but not limited to, Ser |
ne proprietary databases, various forms of | authentication are used to verify affiliation with subscr |
metimes, board portals will use two-factor | authentication for user logins, role-based access control |
data distribution, data replication, user | authentication and user access control, further lowering |
S uses a cracked DVD player key to perform | authentication, libdvdcss uses a generated list of possib |
used in conjunction with common two factor | authentication schemes utilized in ATM, debit/retail poin |
and possibly includes an intermediary for | authentication and version matching. |
launches ASUS WebStorage One Time Password | Authentication (ASUS WebStorage OTP Authentication) to pr |
unctionality, adding support for biometric | authentication, as well as smart-card or token-based auth |
ext Tokens can contain the original client | authentication token when sent from the client to the ser |
A further paper proposed using it as an | authentication protocol, which was subsequently broken. |
Authentication: How will each party prove its identity to | |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |