authenticating

authenticating

1. Authenticating the upgrade failed. There may be a problem with the network or with the server.

18检验升级套件失败。可能是因为跟伺服器的网路连线出现问题。

2. TLS (Transport Layer Security) is capable of authenticating both the client and the server and creating a encrypted connection between the two.

TLS协议(传输层安全)能够在客户机与服务器之间认证,建立加密连接.

3. Signature A signature key pair used for authenticating digitally signed messages or files.

一个签名密钥对,用于对数字签名的消息或文件进行身份验证。

4. SET combines SSL technology with the added security of digital certificates to assist in authenticating parties involved in financial transactions.

一套结合了SSL技术与补充,安全的数码证书,以协助认证当事人在金融交易。

5. Once the serialization is done, creating and integrating the e-Pedigree down the distribution line, and authenticating it, is the harder part of the process.

一旦完成系列化,建立和整合电子谱系了配电线路,并验证它,是很难进程的一部分。

6. A new robust digital watermark algorithm for authenticating the visual content of digital images

一种用于图像认证的鲁棒水印算法

7. To create a complete system for authenticating users of a Web application or site.

一起使用以创建一个完整的Web应用程序或网站的用户身份验证系统。

8. Messages appear for both the authenticating process and the process of being authenticated.

两者为了验证程序与被验证程序产生了一些讯息。

9. Authenticating the contracts and articles of association of the equity joint ventures and contractual joint ventures;

为独资、合资、合作企业合同、章程提供法律见证服务;

10. It is the technology of pattern recognition, which is concerned with analyzing facial images, extracting useful information for recognition and authenticating humans.

人脸的自动识别就是用计算机对人脸图像进行分析,并从人脸图像中提取有效的识别信息,用以进行人脸鉴别的一门技术。

11. The process of authenticating the record could take months.

他们希望能刷新世界纪录,是否如愿还需吉尼斯世界纪录认证。

12. Web services created using ASP.NET have several options for authenticating clients, so the big question is: Which one is right for a specific Web service?

使用ASP.NET创建的Web服务具有多个选项用来对客户端进行身份验证,因此,重要的问题便是哪一个适合于特定的Web服务。

13. Use the LoggingIn event to perform any processing that you need before authenticating a user or to perform custom validation.

使用LoggingIn事件在对用户进行身份验证前执行所需的处理或执行自定义验证。

14. Use the alternate passwd file specified here for authenticating users.

使用这里指定的口令文件来验证用户。

15. The drawer’s signature serves as a means of authenticating a bill of exchange.

出票人的签名作为汇票真伪的鉴定手段。

16. The way to weigh interest is beneficial to improve justice's ability of authenticating, but because of unnormative, deviation of weighing interest results in unfairness.

利益衡量方法有助于提升法官的认证能力,但由于法官运用此方式的不规范性,因利益衡量偏差导致司法不公正的现象比较突出。

17. 1. In macro,government reinforces green legislation, propagandism and authenticating management of ISO14000,constitutes relative policies to encourage corporations to implement green marketing.

加强ISO14000认证管理;制定相关政策支持企业实施绿色营销;

18. Contains a text string which identifies the port of the NAS which is authenticating the user.

包含识别正在验证用户身份的NAS端口的文字字符串。

19. Invoice management: purchasing, filling, issuing, registering, authenticating, offsetting, and recording, verifying and keeping invoices for various taxes including income tax, VAT, CD, Business tax, stamp duty, etc;

发票管理:包括所得税、增值税、关税、营业税、印花税等税种的发票的购买、填开、备案、认证、冲销以及记录、核对、保管等工作;

20. Also, if a computer synchronizes with a manually-specified source instead of its authenticating domain controller, the two computers might be out of synchronization.

另外,如果计算机与手动指定的源同步,而不是与它的身份验证域控制器同步,则这两台计算机可能不同步。

21. Mutually authenticating and then encrypting the content is the only way that you can be reasonably certain that the communication is occurring between trusted components.

只有通过相互验证身份并将内容加密,才能合理地确保通信是在信任的组件之间进行的。

22. authenticating judicatory

司法鉴定

23. NOISE, n. A stench in the ear. Undomesticated music. The chief product and authenticating sign of civilization .

噪音:一种未被驯化的音乐,一种进入耳朵的恶臭,它是文明的主要产品,也是鉴定文明的标志。

24. Therefore, it is a great concern on authenticating the genuineness of edible bird's nest.

因此,如何辨别食用燕窝真伪是非常迫切需要的。

25. When authenticating , introduction public keyencryption technology in LASA ,satisfactorily solve security of transmittinguser's encryption key.

在验证过程中,LASA又引入公钥加密技术,圆满解决了用户加密密钥传递的安全性。

26. The testification and authenticating requirement for foreign documents used in the PRC is generally accepted international practice.

外国的公证文书在内国使用时需要办理认证手续,是国际上的习惯做法;

27. Most auction houses have their own rules and policies for authenticating a piece, placing a piece on auction and making a sale.

大多数拍卖行有自己的规则和策略来鉴定、拍卖艺术品。

28. This default setting will not work if the client and server computer are in different domains (or if the client is authenticating the user locally).

如果客户端和服务器计算机在不同的域中(或者如果客户端对用户进行本地身份验证),此默认设置将不起作用。

29. In fact, as for an effective technology means in authenticating electronic message, electronic signature should be approved by law in its status.

实质上,电子签名作为认证电子文件的有效的技术手段,尚需法律对其身份做出合理的界定。

30. Authenticating Rules

审查判断规则

31. After authenticating Joe, the middle-tier application server uses Joe's credentials to connect to the back-end server to retrieve his payroll information.

对Joe进行身份验证后,中间层应用程序服务器使用Joe的凭据连接后端服务器以检索其工资信息。

32. Analysis and Improvement of a Multisecret Sharing Authenticating Scheme

对一种多重密钥共享认证方案的分析和改进

33. The aim is authenticating the identification of both side of communication and preventing illegal users to filch and masquerade genuine users.

尽管通过口令是最方便的身份验证方法,但它也伴随着字典攻击的威胁。

34. Property identifies the hashing algorithm Message Queuing uses when authenticating messages or when creating a digital signature for a message.

属性标识消息队列在验证消息或为消息创建数字签名时使用的哈希算法。

35. The published edition promises to include a facsimile of the Ripper's confessional document,a transcript and material authenticating that the book is the work of Jack himself.

已上市的此一版本承诺附上一张开膛手的自白书电传文本,一份誊本以及一些文件来证明这本书真的是杰克自己写的。

36. if the reader will have it so, of authenticating, demons, and who place a Styx at the base of society.

并且不容社会下层的人申辩,沙威完全同意这种见解。

37. Applications can use the application block in a variety of situations, such as authenticating and authorizing users against a database, retrieving role and profile information, and caching user profile information.

应用程序可在多种情况下使用应用程序块,例如,根据数据库验证和授权用户、检索角色和配置文件信息,以及缓存用户配置文件信息等。

38. We need to delve into the concept of authenticating a bit more deeply here because authenticating in a WEP environment is a bit of a fool's errand.

我们必须要对认证这个概念进行更为深入的钻研,因为WEP的认证是一个相当失败的做法。

39. We believe that the only viable strategy for authenticating users is to apply the defense in depth principle, mixing a number of authentication techniques.

我们相信用于认证用户的唯一可行的策略是以深度原则应用防御,混合多种认证技术。

40. Instead, they put most of their effort into authenticating the transaction, and they're much more secure because of it.

我们要摒弃这种想法,我们需要的一个用法律来代替技术层面的保护。

41. All client desktop computers nominate the authenticating domain controller as their in-bound time partner.

所有客户端桌面计算机都提名身份验证域控制器作为其入站时间伙伴。

42. authenticating code

押码

43. According to the experiences in building, running, maintaining and administering energy billing system (EBS), the general method for building, authenticating and maintaining EBS is studied.

探讨了建设电能计费系统的一般方式,根据作者在建设、运行、维护和管理电能计费系统方面的经验和教训,提出了电能计费系统计量认证的一般方式和系统运行维护管理办法。

44. The thought about the international qualification of textile technical personnel is arisen by authenticating the grade label of textiles.

摘要由纺织品绿色标签认证引发对纺织技术人员国际资格认定问题的思考。

45. Roles of Teaching Practice and its Lacuna in the Process of Authenticating Teacher's Qualification

教育实习的作用及其在教师资格认证过程中的缺失

46. Encrypt, authenticating, integrality inspection and security management can be used to make sure the information can be stored, transferred and used safely.

数据加密是保证信息安全的最核心、最重要的技术措施,它能够达到信息的机密性、完整性和简单认证。

47. Abstract: Authenticating user is a core part of system security.

文章摘要: 对用户的认讧是系统安全的核心组成部分之一。

48. Methods While carrying on an investigation about the 1 106 sufferers,also carried on the sampling and authenticating to the pathogen.

方法对荆州职业技术学院1106例患者进行调查,同时对病原虫进行采样及鉴定。

49. Prom those results can conclude that the API-ZYM enzyme testing system is a rapid method for cell line authenticating and strains per-screenning.

更可由各菌株酵素系统之完整性,供为菌种筛选之参考。

50. Recently, Xie et al. proposed a multi-secret sharing authenticating scheme based on double secret shadow.

最近,谢琪等人(2005)基于双密钥思想提出了一种多秘密共享认证方案。

51. He fully shared the opinion of those extreme minds which attribute to human law I know not what power of making, or, if the reader will have it so, of authenticating, demons, and who place a Styx at the base of society.

有些人思想过激,他们认为人的法律有权随意指定某人为罪犯,在必要时也有权坐实某人的罪状,并且不容社会下层的人申辩,沙威完全同意这种见解。

52. This system mainly is composed of following several modules: ID authenticating module;

本系统主要由以下几个模块组成:身份验证模块;

53. According to characteristics of RFID system,the first authenticating then reading implementing principle is suggested.

根据RFID系统的特点提出先认证后读取的实现原则。

54. Authenticating against a list of users and groups stored in files on disk.

根据存储在磁盘文件中的用户与组列表进行身份验证。

55. In addition, he was berating himself for being so naive as to hand over the Matrix to Optimus Prime without first authenticating him somehow.

此外,他对自己的天真幼稚感到自责,他没有进行任何的检查就把本源交给了擎天柱。

56. Specifies the name of the domain to use when authenticating an account. Domain is a string.

此类字符串不支持空元素。不要为此设置创建空值。

57. Each authenticated session presents an access token that lists the security identifier for each group in which the authenticating security principal has membership.

每个通过身份验证的会话都会提供访问令牌,列出身份验证安全主体在其中具有成员身份的每个组的安全标识符。

58. Analysis of the Problems of Producing Evidence, Confronting and Authenticating in the Objection System of Civil Jurisdiction

民事管辖异议制度中举证、质证和认证问题探析

59. Application of GC-MS Fingerprint in Authenticating Cigarettes

气相色谱-质谱指纹图谱在甄别真假卷烟上的应用

60. VTDR is important to hold back traffic peccancies such as tired-driving, overspeed, and it is also important for authenticating and analyzing traffic accident.

汽车行驶记录仪的使用,对遏止疲劳驾驶、车辆超速等交通违章、约束驾驶人员的不良驾驶行为、保障车辆行驶安全以及道路交通事故的分析鉴定具有重要的作用。

61. Note Users behind some authenticating proxy servers may experience sign-in issues.

注意:位于某些身份验证代理服务器之后的用户可能会遇到登录问题。

62. Message Queuing uses the digital signature when authenticating messages that were sent by Message Queuing version 1.0.

消息队列在对由消息队列1.0版发送的消息进行身份验证时使用数字签名。

63. The application server and gateway then go through a standard authentication process each authenticating itself to the other and establish a session .

然后应用程序服务器和网关进行标准的认证过程,向对方提供自己的认证信息并建立会话。

64. Identity theft is the misuse of private authenticating information to steal money.

盗用身份是滥用私人认证信息,以盗取金钱为目的。

65. But there are problems as authenticating authorities are mumerous, authenticating types are varied, authenticating valid is equal and so on.

目前,在我国人身伤害案件中的人身伤害鉴定存在着鉴定主体繁多、鉴定类型多样、鉴定结论效力同等等一系列问题。

66. Development of Measure Instrument for the Authenticating Fake Bills or Certificates

票证防伪检测仪的研究

67. A signature key is an asymmetric key pair used for authenticating digitally signed messages or files.

签名密钥是不对称密钥对,用于对数字签名的消息或文件进行身份验证。

68. Simply put, a brand is a promise. By identifying and authenticating a product or service it delivers a pledge of satisfaction and quality.

简单说来,一个品牌就是一个承诺。通过识别和鉴定一个产品或服务,它表达一种对品质和满意度的保证。

69. Intercommunicating regulations between the global communicating and authenticating agent and the local sub-system is discussed simply in the last section of this paper.

简要介绍了全局通信认证代理和区域审计子系统间的交互规程。

70. The whole system is composed of local sub-systems and a global communicating and authenticating a-gent.

系统的总框架由区域审计子系统和全局通信认证代理组成;

71. The Post also reported that Biro was once accused of falsely authenticating a Jackson Pollock painting on the basis of a fingerprint that was allegedly copied off a paint can from the artist's studio.

纽约时报也报导Biro曾经被指控,对JacksonPollock画作上的指纹做出错误的推论。

72. The default is 0, which is O.K. For a server that has other means of authenticating clients.

缺省值为0,适用于使用其它方法验证客户机的服务器,也是如此。

73. At the same time, socks v5 protocol is very suitable for building VPN working in client/server mode, however, it need authenticating.

而Socks5协议本身的特点使得它非常适合与建立客户/服务器模式的虚拟专网,但它是一个需要认证的防火墙协议。

74. Management System Design for Occupation Training and Technical Abilities Authenticating

职业培训与技能鉴定管理系统的设计

75. Gets or sets the hashing algorithm used when authenticating messages or creating a digital signature for a message.

获取或设置在验证消息或为消息创建数字签名时使用的哈希算法。

76. Gets or sets the hashing algorithm that Message Queuing uses when authenticating a message or creating a digital signature for a message.

获取或设置消息队列在验证消息或为消息创建数字签名时使用的哈希算法。

77. authenticating message sequence

认证消息流

78. Authenticating pieces helps prevent counterfeits and fraud, and helps ensure that a returned artifact is the same one that a museum loaned.

认证行为帮助防止赝品和假冒行为,并且帮助确认归还的工艺品是博物馆借出的原品。

79. Sets the password to use when authenticating the client.

设置客户端身份验证所使用的密码。

80. Recognizing and Authenticating the Wireless Device

识别和验证网络设备

英语宝典
考试词汇表