单词:authentication
[计] 验证
n. validating the authenticity of something or someone
authentication的用法和样例:
例句
- Message authentication provides two services.消息身份验证提供两个服务。
- To further enhance security, only registered users can access the MIDS with user caller ID authentication.为进一步提高安全性,只有接受登记的用户,利用来电显示以证明身份方能提取MIDS的资料。
- This chapter provides design patterns for data confidentiality and data origin authentication.本章为数据保密性和数据来源的鉴定提供了设计模式。
- Any party that fails to give cooperation and thus affects the technical authentication shall be held to be responsible.当事人任何一方不予配合,影响医疗事故技术鉴定的,由不予配合的一方承担责任。
词汇搭配
- Password Authentication Protocol口令验证协议...
- authenticate证明...为真
- authentication by the trustee受托人鉴定<验证>...
- personal authentication code个人认证码
- message authentication文电鉴别
- Authentication key验证密钥
- authentication agent认证代理人
- station authentication电台鉴定
- authentication code鉴别代码,鉴别符号,...
- transmission authentication传输证实
单词:authentication 相关文章
Apps Helping Kenyan Businesses Stay Ahead of Counterfeiters 手机应用帮助肯尼亚公司领先于假货商人 NAIROBI Counterfeit goods in Kenya cost the government as much as $1 billion each year in lost tax revenues. The fake goods also hurt e
Scientists Trying to Do Away With Passwords 科学家们试图破除密码 Hackers around the world are getting better at stealing passwords. A hacker is a person who uses a computer to gain information without permission. Now, some computer scientis
AU Access Unit 访问单元 电信英语及其缩略语解释(3) AU Adaptation Unit 适配单元 AU Administrative Unit 管理单元 AUC AUthentication Center 验证中心 audioconference 电话会议
APCM Adaptive Pulse Code Modulation 自适应脉码调制 APCM是在PCM基础上,采用量化自适应,使均方量化误差最小的一种调制方法。 APD Avalanche Photo Diode 雪崩光电二极
皮尤研究中心的一份报告显示,人们往往对网络安全掉以轻心。来看看大家关于网络安全最常见的四个误解。 Use strong passwords and don't go to sketchy websites, and you'll protect yourself online, right? 使用强
For the last two years, all train tickets in China have had to include the real name of the passenger to prevent scalping. But the system clearly isnt working. Numerous pictures have been posted on the internet, showing railway tickets stamped with n
AS IT IS 2015-09-28 Phone Apps Help Stop Counterfeiters in Kenya 手机应用程序帮助打击肯尼亚造假者 Counterfeit goods, or false versions of products, may cost the government of Kenya as much as $1 billion each year. The fake goods also
RACHEL MARTIN, HOST: Top executives from Facebook and Twitter are here in town today with some important meetings. They're going before House and Senate committees on Capitol Hill, and they will be grilled again about what social media companies coul
So today, we rely entirely on big intermediaries -- middlemen like banks, government, 如今,我们完全依赖于大型中介机构,中间商比如银行,政府, big social media companies, credit card companies and so on to establish trust
What did you get? 你发现了什么 I think your friend's bodyguard gave him the wrong security fob. 我觉得你朋友的保镖给了他错的安全卡 Why is that? 这怎么说 Well, once I got past Blackhawk's authentication system, there wasn't
Q. For me, one hindrance to using social media and trying new things online is having to remember the various usernames and passwords. Do you have any advice on simplifying or codifying this process? 问:我使用社交媒体、在网上尝试新事物
Fans of the late Princess Diana have expressed their disgust after a lock of hair said to be from the much-loved royal has been put up for sale on Amazon. 一绺已故的戴安娜王妃的头发被放上亚马逊出售,这位倍受敬爱的皇室成员
Customers who want to continue using payment services via Alipay and WeChat have to authenticate themselves with real names before July 1, otherwise the payment services will be unavailable, Chongqing Evening News reported. 根据《重庆晚报》报道
People who want you to part with your cash and property can steal your passwords and personal details, but what about your voice? That's what some big companies asked themselves before turning their attention to voice biometrics in their war against
Topic1 How to Avoid Being Duped in Broken Vase ScamsPeople in China who attempt to profit through Peng Ci, or extorting money from a driver through creating a traffic accident, may now find the practice more difficult. A court in the eastern city of
Estonian Government Aims to End Paperwork Three-day-old Oskar Lunde sleeps in a small bed at an Estonian hospital. Across the room, his father turns on a laptop computer. Now we will register our child, Andrejs Lunde says, as he lifts his identificat