authentication algorithmの例文

例文

  1. Checksums are used as cryptographic primitives in larger authentication algorithms.
  2. EAP-SIM use a SIM authentication algorithm between the client and an Authentication, Authorization and Accounting ( AAA ) server providing mutual authentication between the client and the network.
  3. To minimize the chance of compromise, the phones use two layers of encryption protocols, IPsec and Secure Real-time Transport Protocol ( SRTP ), and employ NSA's Suite B encryption and authentication algorithms.
  4. In 2012, an improved authentication algorithm, the DECT Standard Authentication Algorithm 2 ( DSAA2 ), and improved version of the encryption algorithm, the DECT Standard Cypher 2 ( DSC2 ), both based on AES 128-bit encryption, were included as optional in the NG-DECT / CAT-iq suite.
  5. In 2012, an improved authentication algorithm, the DECT Standard Authentication Algorithm 2 ( DSAA2 ), and improved version of the encryption algorithm, the DECT Standard Cypher 2 ( DSC2 ), both based on AES 128-bit encryption, were included as optional in the NG-DECT / CAT-iq suite.

隣接する単語

  1. "authenticating stamp"の例文
  2. "authenticating works of art"の例文
  3. "authenticatings"の例文
  4. "authentication"の例文
  5. "authentication agent"の例文
  6. "authentication and authorization"の例文
  7. "authentication and key agreement"の例文
  8. "authentication and key exchange"の例文
  9. "authentication capability"の例文
  10. "authentication center"の例文
  11. "authentication"の例文
  12. "authentication agent"の例文
  13. "authentication and authorization"の例文
  14. "authentication and key agreement"の例文
パソコン版で見る

著作権 © 2024 WordTech 株式会社