首页 / 词典 / good

kerberos

  • 网络身份验证;身份认证;安全机制;单点登录
kerberoskerberos
  1. Kerberos authenticates the identity and encrypts their communications through secret-key cryptography . KERBEROS

    协议认证试图等录上网用户的身份,并通过使用密匙密码为用户间的通信加密

  2. Kerberos is a popular security mechanism used for network authentication .

    Kerberos是用于网络身份验证的常用安全机制。

  3. Study on Application of Kerberos in the Active Directory Domain Forest Model

    Kerberos在活动目录域林模型中的应用研究

  4. The Kerberos authentication service provides an effective method to improve network security .

    Kerberos认证服务提供了一种提高网络安全的行之有效的方法。

  5. A Kind of Improving the Kerberos Authentication Mechanism Safety Property Strategy

    一种提高Kerberos协议安全性能的策略

  6. Design of Web Single Sign On Based on Kerberos Ticket

    基于Kerberos票据的Web单点登录设计

  7. A Secure Model of Intranet Based on the Improved Kerberos Protocol

    基于优化的Kerberos协议的企业网络安全模型

  8. Kerberos Protocol is Used to Realizes Site to Site Security of Network

    利用Kerberos协议实现端到端的网络安全系统

  9. The Analysis and Improvement Of Kerberos Authentication System

    Kerberos身份认证的分析和改进

  10. Implementing Client / Server Application by Using Kerberos with Java

    Java实现运用Kerberos协议的客户机/服务器程序

  11. Improved Kerberos protocol based on public key encryption algorithm of braid groups

    基于辫子群上的公钥加密算法的Kerberos协议改进

  12. Research of Security Authentication in Ad hoc Networks Based on Kerberos Protocol

    基于Kerberos变体的adhoc网络安全认证研究

  13. Research and Improvement of Identity Authentication Based on Kerberos

    基于Kerberos身份认证的研究及改进

  14. Realization of unified authentication based on directory service and Kerberos authentication mechanism

    采用目录服务Kerberos认证实现统一身份认证

  15. Each client login name must be added to Kerberos database .

    必须将每个客户机登录名添加到Kerberos数据库。

  16. Combining PKI and Kerberos to implement authentication and access control in Distributed system

    结合PKI与Kerberos的分布式认证与访问控制

  17. Next , generate the Kerberos key for this user .

    接下来,为此用户生成Kerberos密钥。

  18. Unified authentication based on LDAP protocol and authentication mechanism named Kerberos

    基于LDAP协议与Kerberos认证机制的统一认证

  19. In a pure Kerberos system , the key validation is done in one of two ways

    在纯Kerberos系统中,密钥验证通过以下方式之一完成

  20. USB Cryptographic Key and Its Application in Kerberos System

    USB密码钥及其在Kerberos系统中的应用

  21. Kerberos Authentication Service Analysis and Research

    Kerberos认证技术研究及分析

  22. An Improved Authentication Scheme Based on Kerberos Authentication Protocol

    基于Kerberos认证系统的一个改进的安全认证技术

  23. Next you need to add a Kerberos token to the policy .

    接下来需要向策略添加一个Kerberos令牌。

  24. The Discussion of Using Kerberos to Enhance the Security of Linux User Login

    利用Kerberos增强Linux用户注册安全性的探讨

  25. The DCE authentication service is the key distribution service in the Kerberos model .

    DCE身份验证服务是Kerberos模型中的密钥分发服务。

  26. IBM 's TAI solutions support only the Kerberos based credentials .

    IBM的TAI解决方案仅支持基于Kerberos的凭据。

  27. This system is based on three-side identical Kerberos authentication protocol .

    本系统采用基于可信任第三方的Kerberos认证协议。

  28. An Improved Method of Kerberos Protocol Using Public-Key Algorithms Based on an Error-Correcting Code

    一种基于纠错编码的公钥体制改进Kerberos协议的方法

  29. A Secure Model of Intranet Based on Kerberos

    基于Kerberos的企业网安全模型

  30. Kerberos Based Public Key Authentication Protocol

    基于Kerberos的公开密钥身份认证协议