this paper proposes a new scheme for security e-mail based on authentication management which gives fine-grained approaches to e-mails limit control to implement security management of e-mail.
本文提出了结合密码技术,基于授权管理的安全电子邮件方案,对电子邮件进行细粒度权限控制,实现电子邮件的安全管理。
a new model, role access control model based on authentication trustworthiness (at-rbac) is proposed in the paper.
提出一种基于认证可信度的角色访问控制模型(at-rbac)。
the spring is a security protocol on authentication which adopt the way of mutual-authentication and dynamic key to ensure the security of mac layer on its transfer process.
同步伪随机序列安全协议是一个基于认证的安全协议,采用通信双方相互认证、动态密钥等方式来保障无线局域网信息传输过程中的mac层的安全。
there are many kinds of ways of attacks on authentication protocol, but replay attacks and type flaw attacks account for more than 90 percent of them.
对认证协议的攻击形式有很多,但已构成的攻击事例中,百分之九十以上是重放攻击和类型缺陷攻击。
visit the openid foundation for information on authentication as well as the goals of the foundation within the open source community.
访问 openidfoundation,了解关于身份验证的信息以及这个基金会打算在开放源码社区中实现的目标。
both rely on authentication algorithms supplied by the cryptographic api, which also included in the 2.6 kernel.
它们都依赖于2.6内核中包含的cryptographicapi提供的认证算法。
this technology is based on the symmetrical key algorithm, adopt a pair of keys to carry on authentication to broadcast message, and upgrade a key in one pair of authentication keys fixedly.
该技术基于对称密钥算法,采用双密钥对广播消息进行认证加密,广播节点定期更新双广播密钥中的一个密钥。
secondly, research on authentication watermarking technology.
认证水印技术的研究。
accessing shared files or printers that are available in the network, which are available to users based on authentication
用户通过身份验证访问网络上的共享文件或打印机