authentication of message

英 [ɔːˌθentɪˈkeɪʃn ɒv ˈmesɪdʒ] 美 [ɔːˌθentɪˈkeɪʃn əv ˈmesɪdʒ]

信息鉴别

计算机



双语例句

  1. The JAX-RPC handler adds a SAML Authentication Assertion ( built on top of user's identity) into the message invoking the SAML Provider application
    JAX-RPC处理程序添加SAML验证断言(建立在用户身份顶部)到消息中,以调用SAMLProvider应用程序
  2. With HTTPS, you can perform mutual authentication of both the sender and receiver of messages and ensure message confidentiality.
    通过使用HTTPS,您可以执行消息的发送者和接收者的相互认证,从而确保消息的机密性。
  3. Signer authentication, also known as digital signatures, ensures that the identity of the message is valid.
    签名者身份验证(也称为数字签名)确保消息发送者的身份是有效的。
  4. One is authentication of the identity of the creator of the message, which is called message authentication.
    一种是消息创建者的身份验证,它被称为消息身份验证。
  5. The authentication service then encrypts the STkt and copy of the session key using the TGT session key and sends the message back to the client.
    身份验证服务然后使用TGT会话密钥加密STkt和会话密钥的副本,再将消息发回给客户端。
  6. A security profile is used to specify whether authentication, authorization, and identity mapping and propagation are performed on the identity of messages in the message flow, and if so, which external security provider is used.
    一个安全配置文件被用于指定身份验证、授权、身份映射和广播是否在这个消息流中的消息身份上执行,如果是这样,外部安全提供者将被使用。
  7. Keep in mind that SSL will also involve at least one authentication of the server to whom a message is being sent, thus some redundancy is occurring.
    请谨记,SSL将至少包括对消息要发送到的服务器的一项验证,因而就会产生一些冗余。
  8. As mentioned above, there are two common technologies used to satisfy the requirement of message authentication: the Message Authentication Code and the digital signature.
    正如上文所提到的,为满足消息身份验证的要求,用到了两项通用技术:消息身份验证代码(MessageAuthenticationCode)和数字签名。
  9. The authentication error and the authentication mechanism are specified in the text of the error message.
    错误消息文本中指定了身份验证错误和身份验证机制。
  10. The authentication mechanism for the nodes joined to cluster and the certification of first broadcast message of candidate cluster were introduced during cluster formation stage.
    簇形成阶段引入对加入簇节点的身份验证机制以及对候选簇首广播消息的认证。
  11. In the case of message-digest authentication, the authentication data field contains the key-id and the length of the message digest that is appended to the packet.
    在讯息摘要认证状况,认证资料栏位包含附加到封包的键识别子和讯息摘要的长度。
  12. To request authentication, the sending application must set the authentication level of the message to be authenticated and attach a security certificate to the message.
    若要请求身份验证,发送应用程序必须设置要进行身份验证的消息的身份验证级别,并且将安全证书附加到消息。
  13. By using Java Authentication and Authorization Service ( JAAS) provided by J2EE, an implementation method of the system security was presented, and the combination of the Java Message Service ( JMS) and system workflow explained the flow management mechanism of DCMS.
    利用J2EE提供的JAAS服务提出了系统安全的实现方法,并通过JMS消息机制与需求链管理系统工作流程的结合,阐述了需求链管理系统流程管理的机制。
  14. The secure transportation and identity authentication of EDI message are the key part of the EDI's application and development.
    EDI报文信息的安全传输和身份认证是EDI应用推广的关键。
  15. ASP is applied to developing network system more and more widely, so it is very important for the security of network system based on ASP to effectively transmit the signature and status authentication of data ( message).
    ASP被广泛地应用于网络系统的开发,如何在ASP网页中有效地实施传输数据(消息)的签名和身份认证对于基于ASP的网络系统安全非常重要。
  16. The Deficiency of Shared Cost Authentication System in CMPP-simply analysis a limitation of domestic internet short message charge system
    CMPP协议中费用分担认证机制的不足&简析国内Internet短消息计费机制的一个缺陷
  17. Owing to the source authentication of multicast that is one of major security concerns of multicast communication, a secure and efficient source authentication scheme for multicast is present by means of Message Authentication Codes.
    考虑到源认证是组播的最主要安全事务之一,文章基于消息认证码提出了一种安全有效的组播源认证方法。
  18. Based on the requirements of message authentication code ( MAC) in current network communication, this paper introduces the cryptographic secure properties of a Hash function, and analyses its applications in message authentication and the main attacks against a Hash function.
    基于当前网络通信中对报文鉴别码(MAC)的需求,介绍了Hash函数在密码学上的安全性质,分析了Hash函数在报文鉴别中的应用和针对Hash函数的主要攻击。
  19. The encryption 、 authentication and authorization of SOAP specification have been widely focused on message security since SOAP specification was released.
    自从SOAP规范发布以来,在消息级安全上对SOAP规范的加密、认证和授权等安全机制一直受到人们的广泛关注。
  20. Digital signature technology, one of the core technologies of information security, provides authentication, integrity and non-repudiation of message. Moreover, some digital signature schemes with additional properties are gradually satisfying the application requirements in practice.
    数字签名技术作为信息安全核心技术之一,不仅提供认证性、完整性和不可否认性,而且不断发展的具有特殊性质的数字签名正在逐步满足人们现实生活中的各种应用需求。
  21. But the traditional signature technology only satisfies text information authentication, which is sensitive to every bit of the input message.
    但是传统的数字签名技术对输入信息的每一位非常敏感,只满足文本信息认证的需要。
  22. In fact, communication authentication protocol is the basis of other security services. Entity authentication, integrity of message contents transmitted, as well as secure distribution of keys can be realized by using communication authentication protocols.
    事实上,通信认证协议是其它各种安全业务的基础,通过使用通信认证协议可以实现实体身份的认证,保证传输的消息内容的完整性,以及密钥的安全分配。
  23. Message signature and authentication remains the same, but the attackers try to modify the SOAP message through deleting or adding some elements in head or entity, which changed hierarchy of the original SOAP message element.
    消息的签名和认证等部分保持不变,但是攻击者却通过在SOAP消息的首部或实体删除或者添加一些元素来试图修改SOAP消息,这样改变了原SOAP消息元素的层次结构。
  24. The fifth chapter provided the software structure of authentication models detailed, and described the realization of message processing explicitly.
    第五章提供了认证模块中各部分的软件构成,并详细描述了报文处理部分的实现过程。
  25. This security method achieved the safety of both authentication and data encryption. At the same time, it meets the safety requirements of SIP to ensure that the integrity, reliability and incontestability in the process of session establishment and message conversation.
    该方法实现了认证和数据加密双项安全,满足了SIP的安全要求,保证了会话建立和消息通信过程中的完整性、可靠性和不可抵赖性。
  26. Hash functions play important roles in modern cryptography and are widely used in data integrity and entity authentication. Hash functions also guarantee securities of cryptographic schemes and protocols, such as digital signature and message authentication code.
    Hash函数在现代密码学中起着重要的作用,可用于保证数据完整性和实体认证,同时也是多种密码体制和协议的安全保障,例如数字签名、消息认证码等。
  27. When fragmentation is needed, hash authentication tree is harnessed to decrease the number of authorization request;( 2) Proposed a message delivery path tracking protocol for the delay tolerant networks.
    当信息需要分片传输时,协议使用哈希认证树减少授权申请的次数;(2)提出了一个信息传播路径的跟踪协议。
  28. We present a VCS based on message authentication model by means of the public key infrastructure based on message authentication model for the dishonest distribution existing in VC.
    针对可视密码中存在的分发者的不诚实问题,引入了基于消息认证模型的公钥基础结构来建立基于消息认证模型的可视密码方案。