authentication

  • 51AUTHENTICATION - подтверждение подлинности, аутентификация — процесс идентификации пользователя при доступе к информации, компьютерной системе, вычислительной сети, электронной почте и т.д. Выполняется в целях безопасности, основывается на использовании паролей, специальных карточек, цифровой подписи и др …

    Словарь электронного бизнеса

  • 52AUTHENTICATION TOKEN - жетон — (карточка) для аутентификацииминиатюрное устройство для установления личности пользователя с помощью пароля отзыва, временных последовательностей кодов или с применением другой технологии …

    Словарь электронного бизнеса

  • 53authentication of signature — verification of a signature …

    English contemporary dictionary

  • 54Authentication or signature —   An ISO term. See preferred term Authenticator …

    International financial encyclopaedia

  • 55authentication key — /ɔθɛntəˈkeɪʃən ki/ (say awthentuh kayshuhn kee) noun a code which is based on a unique set of numbers, data relating to the transaction, etc., which authenticates and secures a data transfer. Also, digital key …

  • 56Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in …

    Wikipedia

  • 57Digest access authentication — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · …

    Wikipedia

  • 58Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… …

    Wikipedia

  • 59Integrated Windows Authentication — (IWA) is a term associated with Microsoft products that refers to the SPNEGO, Kerberos, and NTLMSSP authentication protocols with respect to SSPI functionality introduced with Microsoft Windows 2000 and included with later Windows NT based… …

    Wikipedia

  • 60CAVE-based Authentication — Articleissues context = September 2008 deadend = September 2008 intromissing = September 2008 jargon = September 2008 unreferenced = September 2008 wikify = September 2008 CAVE based Authentication a.k.a. HLR Authentication, 2G Authentication,… …

    Wikipedia