「AUTHENTICATION」の共起表現(2語右で並び替え) - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > AUTHENTICATIONの意味・解説 > AUTHENTICATIONに関連した共起表現

「AUTHENTICATION」の共起表現一覧(2語右で並び替え)

該当件数 : 112



During the authentication phase, a user is asked to classify his pre
sion-critical environments where the quick authentication of a high number of individuals from many
ptography, a Cipher Block Chaining Message Authentication Code, abbreviated CBC-MAC, is a technique
ntegrates Spring, ACEGI, Dojo Toolkit 1.0, authentication, LDAP, ActiveDirectory and POJOs and their
Also note that "Windows Authentication" should be used (as opposed to SQL Server
ls such as SSL communications, client-side authentication and AES encryption.
n iTunes 7 was released, Apple changed the authentication scheme again which caused the older versio
based MAC) is a block cipher-based message authentication code algorithm.
tands for Parallelizable MAC, is a message authentication code algorithm.
Twitter's OAuth ( authentication protocol) allowed instant registration for
can also be configured to provide pre-boot authentication through an initrd, thus encrypting all dat
e are things like weaknesses in protocols, authentication strategies, and system modularization.
luminum foil that permits stamping with an authentication seal and serial number.
se includes all the HTTP headers including authentication data and HTTP cookie contents, which are t
onality; the service offers a central user authentication system and thus allows the same users to b
d-winning speeches about Java, the Central Authentication Service, and other topics at industry conf
Burrows-Abadi-Needham logic for analyzing authentication protocols, and his book (with Luca Cardell
ith the Ministry of Economic Development's Authentication Project, and later a report on the State S
It's able to manage the authorisation and authentication of applications users.
such as SSL/PKI and/or Two or Three Factor Authentication solutions are in place.
ain function level, two added features are Authentication Mechanism Assurance and Automatic SPN Mana
IRCX defines ways to use SASL authentication to authenticate securely to the server, ch
User authentication and authorisation
Authorizer - provides authentication and authorization facilities.
thorization/policy provider for JAAS (Java Authentication and Authorization Service).
ty-related optional packages, such as Java Authentication and Authorization Service (JAAS), Java Sec
ss to the computer by circumventing normal authentication and authorization mechanisms.
not provide a strong level of security as authentication may be difficult to establish and secure c
Authentication is being performed not only for user login
he rule of reason and substitute for it an authentication of belief by the intentness and degree of
decryption, digital signing/verification, authentication etc.) can be performed.
ons in enterprise-wide security, including authentication, digital certificates, intrusion detection
vulnerable to virus attacks and the like; authentication and challenges are made part of the specif
OMAC (One-key MAC) is a message authentication code constructed from a block cipher much
schema validation, encryption/decryption, authentication, signing, data transformation and protocol
Authentication, by definition, is concerned with the vali
DomainKeys is an e-mail authentication system designed to verify the DNS domain o
It supports password authentication and digital certificate authentication.
versight of all Notaries Public, the legal authentication of documents, maintaining oversight and re
This authentication is done in order to perform digital signin
riginal user password, ASUS WebStorage OTP Authentication provides double protection for all persona
es and colleges, and requires some form of authentication by end users.
Pageant - an SSH authentication agent for PuTTY, PSCP and Plink;
DenyHosts checks the end of the authentication log for recent failed login attempts.
ork at Experian focuses on knowledge-based authentication for fraud prevention.
DEA, TestLink, TestRail, and supports user authentication with Google Account, Yahoo!, OpenID and LD
After the authentication, The Guardian quoted Ian Champion of the U
anning group, there developing the Central Authentication Service in "one week using a text editor."
Windows authentication or integrated database authentication
ec, L2TP or L2TP/IPsec, support for RADIUS authentication in Internet Authentication Service, networ
Netcare uses a two-factor authentication protocol involving a username/password com
Services are provided using srvx; the user authentication service is named AuthServ and the channel
If the authentication protocol is not carefully designed, the ta
ocol cannot be effectively used to provide authentication, although it can ensure that no third part
The Product Authentication Inspectorate Ltd has set a standard for Do
ice will start using the site with all the authentication of Mallory.
The lack of a Message Authentication Code means that file corruption (accidenta
other computers (optionally using password authentication); this mechanism allows one person to mana
ndards such as OAuth authorization, OpenID authentication, XRD metadata discovery, the Portable Cont
Little is known about the role of NTLM authentication on MSN Chat.
MSNP8 introduced a different authentication method, now sending authorization to Micro
ommittee chairman of ANACS the grading and authentication service of the ANA.
Documents, this procedure is simply called authentication instead of apostille.
s called a biometric word list because the authentication depended on the two human users recognizin
; if any of them are required to be secret authentication values or IDs that the attacker can't gues
AuthServ, which provides authentication for other services on the network and allo
submission, JavaScript, HTTP basic access authentication, automatic page redirection, and cookies.
r can deal with HTTPS security, basic http authentication, automatic page redirection and other HTTP
only used on many websites (including user authentication and permissions, object lifecycles and aja
ted with newer available firmware (pinware authentication and PIN entry), but as with any new piece
Authentication takes place on UDP port 153.
putes, identification of wildlife remains, authentication of plants and seeds besides a battery of m
The system itself manages the user authentication, payment processing, administration and th
rfect Passwords: Selection, Protection and Authentication; Syngress Publishing; ISBN 1-59749-041-5
SAASM allows satellite authentication, over-the-air rekeying, and contingency re
ring framework provides support for users, authentication and roles.
products, services and infrastructure for authentication and secure digital interactions.
nd distribution of securities, custody and authentication of securities, agency of registration and
witches/routers/VPN systems and the Policy authentication (AD server/certificate server/802.1x),
NS or Domain Name System Servers, (Network Authentication, Network Shares, Network Resources, Email
PKI support provided for SSL X.509 Authentication, WS-Security Signatures, and WS-Security E
The use of strong authentication tools simply creates an increased level of
Optional two-factor authentication using smart cards and/or hardware security
support (Socks 4,4a,5, http, local) (proxy authentication also supported)
It also supports fewer authentication protocols than fetchmail.
nerability, by introducing stronger caller authentication factors than the human-operated help desk
It has a flexible authentication system that allows editors to be granted s
k cipher and creating an efficient message authentication code that is provably reducible in securit
One-time password authentication with the OTPW package is accomplished via
User identification and authentication during the exchange of data with third par
This imperial authentication of the painting meant that no-one seriousl
ites have deployed Zephyr using Kerberos 4 authentication exclusively, though in late 2007, some sit
igurations when PAM is the underlying host authentication provider to effectively provide password a
he two parties to verbally compare a short authentication string to detect a man-in-the-middle attac
The two parties compared a short authentication string to detect a Man-in-the-middle attac
face to facilitate NTLM challenge-response authentication and to negotiate integrity and confidentia
ADAPT (Active Directory Authentication Processing Tool)
ad jurisdiction in actions of slander, the authentication of tutorial and curatorial inventories, ac
ty provided by WSGI middleware may include authentication, logging, url redirection, creation of ses
NTLMSSP is used wherever SSPI authentication is used including, but not limited to, Ser
ne proprietary databases, various forms of authentication are used to verify affiliation with subscr
metimes, board portals will use two-factor authentication for user logins, role-based access control
data distribution, data replication, user authentication and user access control, further lowering
S uses a cracked DVD player key to perform authentication, libdvdcss uses a generated list of possib
used in conjunction with common two factor authentication schemes utilized in ATM, debit/retail poin
and possibly includes an intermediary for authentication and version matching.
launches ASUS WebStorage One Time Password Authentication (ASUS WebStorage OTP Authentication) to pr
unctionality, adding support for biometric authentication, as well as smart-card or token-based auth
ext Tokens can contain the original client authentication token when sent from the client to the ser
A further paper proposed using it as an authentication protocol, which was subsequently broken.
Authentication: How will each party prove its identity to
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS