authentication dataの例文
もっと例文: 1 2 3
- ISAKMP defines payloads for exchanging key generation and authentication data.
- Fingerprints can also be useful when automating the exchange or storage of key authentication data.
- Additional caller authentication data could include account number, personal information, password and biometrics ( such as voice print ).
- They typically use a built-in screen to display the generated authentication data, which is manually typed in by the user.
- The strong authentication procedure should be designed in such a way as to protect the confidentiality of the authentication data ."