certificate-based authentication
- certificate-based authentication
- liudijamasis tapatumo nustatymas
statusas T sritis informatika
apibrėžtis ↑Tapatumo nustatymas naudojant ↑liudijimus ir ↑kriptografiją viešuoju raktu.
atitikmenys: angl. certificate-based authentication
ryšiai: dar žiūrėk – kriptografija viešuoju raktu
dar žiūrėk – liudijimas
dar žiūrėk – tapatumo nustatymas
palygink – slaptažodinis tapatumo nustatymas
Enciklopedinis kompiuterijos žodynas .
Valentina Dagienė, Gintautas Grigas, Tatjana Jevsikova .
2008.
Look at other dictionaries:
Certificate server — Certificate servers validate, or certify, keys as part of a Public key infrastructure. Keys are strings of text generated from a series of encryption algorithms that allow you to secure communication for a group of users. Many Web servers, such… … Wikipedia
Certificate policy — A certificate policy is a document which aims to state what are the different actors of a public key infrastructure (PKI), their roles and their duties. This document is published in the PKI perimeter. When in use with X.509 certificates, a… … Wikipedia
Authentication Header — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Protected Extensible Authentication Protocol — PEAP is also an acronym for Personal Egress Air Packs. Protected Extensible Authentication Protocol, Protected EAP, or simply PEAP (pronounced peep ), is a method to securely transmit authentication information, including passwords, over wired or … Wikipedia
Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… … Wikipedia
Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… … Wikipedia
E-mail authentication — is the effort to equip messages of the e mail transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It is different from content filtering s fuzzy methods.… … Wikipedia
Public key certificate — Diagram of an example usage of digital certificate In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document which uses a digital signature to bind a public key with an… … Wikipedia
Cost-based anti-spam systems — Since spam occurs primarily because it is so cheap to send, a proposed set of solutions require that senders pay some cost in order to send spam, making it prohibitively expensive for spammers. Contents 1 Stamps 2 Proof of work systems 3 Bonds or … Wikipedia