您要查找的是不是:
- Proxy is requiring an authentication scheme that is not supported. 代理程序正在请求一个不支持的验证方案。
- This paper introduces a public key authentication scheme Based on discrete logarithms. 介绍了一种基于离散对数的公开赛钥认证方案,该方案不需要设立特权者来认证公开密钥。
- A deniable authentication scheme for secret communication suits the sender to parallel implementation is provided. 本文提出了一种用在秘密通信中的、合于发送端并行实现的可拒绝认证方案。
- Currently, Kerberos is the most widely-used authentication scheme for distribution system. 在众多认证架构中,Kerberos认证技术是目前最广为使用的认证系统。
- We introduced ECC to the Diffie-Hellman Key Exchange Protocol,and added new Authentication Scheme using a certificate in the protocol. 协议把ECC引入D iffie-Hellm an密钥交换过程,并在此过程中添加证书认证方案来完成相互认证和密钥协商。
- Wu?s remote login authentication scheme could not resist the impersonation attack. That scheme is based on simple geometric properties on the Euclidean plane. wu提出的基于几何方法的程登录认证方案无法抵制假冒攻击.
- Analyze advance signature and identification scheme,A deniable authentication scheme is developed. This Deniable authentication is suitable for argy-bargy prototype. 对中高级签名和认证技术进行研究,在分析了群签名,环签名和可否认签名的基础上,设计了可否认的认证方案。
- This paper presents two kinds of multicast authentication technologies, describes the idiographic authentication scheme, and gives the compare of each scheme. 本文介绍了两种应用于多播的基本认证技术,描述了具体的认证实施方案,并对方案的特点进行了比较;
- The Oracle9iAS Wireless APIs can be used to customize the runtime behavior of the server,for example,providing a different authentication scheme or providing a customized device identification mechanism. Oracle9iAS Wireless API 可以用于定制服务器的运行时行为,例如,提供不同的认证方案模式或提供定制的设备标识机制。
- The Oracle9iAS Wireless APIs can be used to customize the runtime behavior of the server, for example, providing a different authentication scheme or providing a customized device identification mechanism. Oracle9iAS Wireless API 可以用于定制服务器的运行时行为,例如,提供不同的认证方案模式或提供定制的设备标识机制。
- A new authentication scheme named Virtual Enterprise Certificate Authority (VECA) is proposed, in which the technologies of secret sharing, threshold signature and dynamic Public Key Infrastructure (PKI) are employed. 结合秘密分享、门限签名和动态PKI的思想,提出了基于虚拟企业认证中心(VECA)的签名和认证方案。
- The dissertation makes a deep study on security mechanisms of WLAN, and summarizes experiences and lessons in previous protocol design. The dissertation proposed principle of designing security protocol, and proposed a authentication scheme based on PKI. 本文中,作者对无线局域网协议的安全机制进行了深入的研究,总结了协议设计中的经验教训,提出了安全协议设计准则,并提出了一个基于公钥基础设施PKI体系的认证方案,本方案的改进之处主要在于:
- In order to solve the problems of current source authentication methods, this thesis brings forward a new source authentication scheme based on the events sequence----ESA(Events Sequence Authentication). 根据现有源认证方法的不足和存在问题,本文提出了基于事件序列的源认证方案ESA(Events Sequence Authentication),该方案不依赖时间同步机制,具有快速认证,抗丢失性和扩展性较好的特点。
- Based on the plane geometric properties, this paper gives a remote password authentication scheme withoutpassword table, and analyses this scheme,s security and computing property. 基于平面几何特性给出了一种不用通行字表的远程通行字认证方案,并对该方案的安全性和计算特性进行了分析。
- With the widely application of JPEG image, we studied the exact authentication scheme of JPEG image in which select the embedding area by modifying quantification table, tradeoff between watermark embedding capacity and image quality. 针对使用标准量化表的JPEG图像文件认证算法嵌入容量小、安全性不高的不足,本文使用调整量化表的方法折中水印图像质量和嵌入容量之间的矛盾,使得设计的认证算法在图像保真度和安全性方面都有一定提高。
- Chen, J.R. and Hsiang, C.H. (1997) “A Comment on Chang and Liao's Remote Password Authentication Scheme,”American Chinese Management Educator International Conference (ACME VII), USA. 陈正镕,项勤校(民87)“资讯战中低建置成本的使用者确认机制”,陆军官校七十五周年校庆学术论文研讨会,页151-156。
- Role-based security is commonly used to implement custom authentication schemes. 基于角色的安全策略通常用于实现自定义的身份验证方案。
- An of Authentication Scheme Based on CPK 一种基于CPK技术的认证方案
- Dynamic ID-based remote user authentication scheme 基于动态ID的远程用户身份认证方案
- Key Authentication Scheme Based on Smart Cards 一种基于智能卡的公钥认证方案