Englisch » Arabisch

authentication <an authentication; authentications> SUBST

authentication
authentication COMPUT
authentication COMPUT
authentication COMPUT
authentication COMPUT
authentication COMPUT
authentication COMPUT

authentication

authentication

Anonymous authentication SUBST COMPUT

authentication data SUBST COMPUT

authentication database SUBST COMPUT

authentication method SUBST

authentication method COMPUT
authentication method COMPUT

authentication option SUBST COMPUT

authentication page SUBST COMPUT

authentication page

authentication service SUBST COMPUT

authentication set SUBST COMPUT

authentication set

authentication ticket COMPUT

Basic authentication SUBST COMPUT

certificate authentication SUBST COMPUT

delegated authentication SUBST COMPUT

Digest authentication SUBST COMPUT

Digest authentication

flexible authentication SUBST COMPUT

flexible authentication

password authentication SUBST COMPUT

plaintext authentication SUBST COMPUT

pluggable authentication SUBST COMPUT

proxy authentication SUBST COMPUT

Einsprachige Beispiele (nicht von der PONS Redaktion geprüft)

Englisch
Some servers or devices that have an authentication system, have default usernames and passwords.
en.wikipedia.org
This property can be used to break naive authentication schemes based on hash functions.
en.wikipedia.org
In general, all compromised authentication material (such as passwords) must be replaced.
en.wikipedia.org
During the regular interaction between a client and a server, the only requests related to authentication are about the "host-based access method".
en.wikipedia.org
A captive portal is used for a variety of functions including, billing or authentication and acceptance of terms and conditions.
en.wikipedia.org
Stolen tokens can be made useless by using two factor authentication.
en.wikipedia.org
For instance, a bare encryption algorithm will provide no authentication mechanism, nor any explicit message integrity checking.
en.wikipedia.org
These are things like weaknesses in protocols, authentication strategies, and system modularization.
en.wikipedia.org
The device contains a password which is physically hidden (not visible to the possessor), but which is transmitted for each authentication.
en.wikipedia.org
Inside the token is an accurate clock that has been synchronized with the clock on the proprietary authentication server.
en.wikipedia.org

Seite auf Deutsch | English | Español | Français | Italiano | Polski