anglais » arabe

authentication <an authentication; authentications> SUBST

authentication
authentication INFOR
authentication INFOR
authentication INFOR
authentication INFOR
authentication INFOR
authentication INFOR

authentication

authentication

Anonymous authentication SUBST INFOR

authentication data SUBST INFOR

authentication database SUBST INFOR

authentication method SUBST

authentication method INFOR
authentication method INFOR

authentication option SUBST INFOR

authentication page SUBST INFOR

authentication page

authentication service SUBST INFOR

authentication set SUBST INFOR

authentication set

authentication ticket INFOR

Basic authentication SUBST INFOR

certificate authentication SUBST INFOR

delegated authentication SUBST INFOR

Digest authentication SUBST INFOR

Digest authentication

flexible authentication SUBST INFOR

flexible authentication

password authentication SUBST INFOR

plaintext authentication SUBST INFOR

pluggable authentication SUBST INFOR

proxy authentication SUBST INFOR

Exemples monolingues (non-vérifiés par l'équipe de rédaction)

anglais
Some servers or devices that have an authentication system, have default usernames and passwords.
en.wikipedia.org
This property can be used to break naive authentication schemes based on hash functions.
en.wikipedia.org
In general, all compromised authentication material (such as passwords) must be replaced.
en.wikipedia.org
During the regular interaction between a client and a server, the only requests related to authentication are about the "host-based access method".
en.wikipedia.org
A captive portal is used for a variety of functions including, billing or authentication and acceptance of terms and conditions.
en.wikipedia.org
Stolen tokens can be made useless by using two factor authentication.
en.wikipedia.org
For instance, a bare encryption algorithm will provide no authentication mechanism, nor any explicit message integrity checking.
en.wikipedia.org
These are things like weaknesses in protocols, authentication strategies, and system modularization.
en.wikipedia.org
The device contains a password which is physically hidden (not visible to the possessor), but which is transmitted for each authentication.
en.wikipedia.org
Inside the token is an accurate clock that has been synchronized with the clock on the proprietary authentication server.
en.wikipedia.org

Page en Deutsch | English | Español | Français | Italiano | Polski