搜索结果
找到约 37 项符合
authentication 的查询结果
按分类筛选
加密解密 Examples using Message Authentication Codes (MACs) and Message Digests
Examples using Message Authentication Codes (MACs) and Message Digests
其他书籍 Digital Fragile Watermarking Scheme For Authentication Of JPEG Images 对于鉴别JPEG图象的数字易损水印方案
Digital Fragile Watermarking Scheme For Authentication Of JPEG Images
对于鉴别JPEG图象的数字易损水印方案
加密解密 This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message au
This standard describes a keyed-hash message authentication code (HMAC), a
mechanism for message authentication using cryptographic hash functions. HMAC can
be used with any iterative Approved cryptographic hash function, in combination with a
shared secret key. The cryptographic strength of HMAC de ...
Internet/网络编程 RFC2617_HTTP “HTTP/1.0”中包括基本访问鉴别方案(Basic Access Authentication scheme)本文档还提供了HTTP鉴别框架的规范
RFC2617_HTTP “HTTP/1.0”中包括基本访问鉴别方案(Basic Access Authentication scheme)本文档还提供了HTTP鉴别框架的规范,有关原始的基本鉴别方案和基于哈希加密的方案的内容
软件设计/软件工程 SHA-based session authentication technology SHA-based session authentication technology
SHA-based session authentication technology SHA-based session authentication technology
文件格式 WAPI是WLAN Authentication and Privacy Infrastructure的英文缩写。
WAPI是WLAN Authentication and Privacy Infrastructure的英文缩写。
其他 MiniSip Client with DomainKeys Authentication, Sip, Audio communications, Echo Cancel
MiniSip Client with DomainKeys Authentication, Sip, Audio communications, Echo Cancel
加密解密 加密算法实现 Pegwit is a program for performing public key file encryption and authentication. Encr
加密算法实现
Pegwit is a program for performing public key file encryption
and authentication.
Encryption means that pegwit allows you to keep the information
in files you send by email (or other means) confidential.
Eavesdroppers will not be able to read the email.
Authentication allows you to c ...
Java编程 Authentication filer - servlet
Authentication filer - servlet
通讯编程文档 GSM Security and the protocols involves in a mobile environment authentication process
GSM Security and the protocols involves in a mobile environment authentication process