inglés » árabe

authentication <an authentication; authentications> SUST.

authentication
authentication INFORM.
authentication INFORM.
authentication INFORM.
authentication INFORM.
authentication INFORM.
authentication INFORM.

authentication

authentication

Anonymous authentication SUST. INFORM.

authentication data SUST. INFORM.

authentication database SUST. INFORM.

authentication method SUST.

authentication method INFORM.
authentication method INFORM.

authentication option SUST. INFORM.

authentication page SUST. INFORM.

authentication page

authentication service SUST. INFORM.

authentication set SUST. INFORM.

authentication set

authentication ticket INFORM.

Basic authentication SUST. INFORM.

certificate authentication SUST. INFORM.

delegated authentication SUST. INFORM.

Digest authentication SUST. INFORM.

Digest authentication

flexible authentication SUST. INFORM.

flexible authentication

password authentication SUST. INFORM.

plaintext authentication SUST. INFORM.

pluggable authentication SUST. INFORM.

proxy authentication SUST. INFORM.

Ejemplos monolingües (no verificados por la redacción de PONS)

inglés
Some servers or devices that have an authentication system, have default usernames and passwords.
en.wikipedia.org
This property can be used to break naive authentication schemes based on hash functions.
en.wikipedia.org
In general, all compromised authentication material (such as passwords) must be replaced.
en.wikipedia.org
During the regular interaction between a client and a server, the only requests related to authentication are about the "host-based access method".
en.wikipedia.org
A captive portal is used for a variety of functions including, billing or authentication and acceptance of terms and conditions.
en.wikipedia.org
Stolen tokens can be made useless by using two factor authentication.
en.wikipedia.org
For instance, a bare encryption algorithm will provide no authentication mechanism, nor any explicit message integrity checking.
en.wikipedia.org
These are things like weaknesses in protocols, authentication strategies, and system modularization.
en.wikipedia.org
The device contains a password which is physically hidden (not visible to the possessor), but which is transmitted for each authentication.
en.wikipedia.org
Inside the token is an accurate clock that has been synchronized with the clock on the proprietary authentication server.
en.wikipedia.org

Página en Deutsch | English | Español | Français | Italiano | Polski