reverse authentication

reverse authentication
обращенное подтверждение права на доступ

authentication exchange — подтверждение подлинности

source authentication — подтверждение подлинности источника


English-Russian base dictionary . 2014.

Игры ⚽ Нужен реферат?

Смотреть что такое "reverse authentication" в других словарях:

  • Reverse DNS lookup — This article is about the network process of reverse DNS lookup. For other meanings, see Reverse DNS (disambiguation). Contents 1 IPv4 reverse resolution 1.1 Classless reverse DNS method …   Wikipedia

  • Reverse proxy — A reverse proxy or surrogate is a proxy server that is installed within the neighborhood of one or more servers. Typically, reverse proxies are used in front of Web servers. All connections coming from the Internet addressed to one of the Web… …   Wikipedia

  • Forward Confirmed reverse DNS — FCrDNS, or Forward Confirmed Reverse DNS, is when an IP address has both forward (name > IP) and reverse (IP > name) DNS entries that match each other. The process is outlined in RFC 1912, especially section 2.1. First a reverse DNS lookup is… …   Wikipedia

  • E-mail authentication — is the effort to equip messages of the e mail transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It is different from content filtering s fuzzy methods.… …   Wikipedia

  • Secure Password Authentication — is a protocol used to authenticate with a Simple Mail Transfer Protocol (SMTP) server. The protocol is attributed to Microsoft, but it is not an original protocol, but based on the NTLM authentication scheme.NTLM Authentication Scheme for… …   Wikipedia

  • Secure Password Authentication — NTLM (kurz für NT LAN Manager) oder auch NTCR (NT challenge/response) ist ein Authentifizierungsverfahren. Es verwendet eine Challenge Response Authentifizierung. Durch den Einsatz von NTLM über HTTP ist ein Single Sign on auf Webservern oder… …   Deutsch Wikipedia

  • Proxy server — For Wikipedia s policy on editing from open proxies, please see Wikipedia:Open proxies. Communication between two computers (shown in grey) connected through a third computer (shown in red) acting as a proxy. In …   Wikipedia

  • Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… …   Wikipedia

  • MIFARE — is the NXP Semiconductors owned trademark of a series of chips widely used in contactless smart cards and proximity cards. According to the producers, billions of smart card chips and many millions of reader modules have been sold.[1] The… …   Wikipedia

  • Список портов TCP и UDP — Эта статья содержит незавершённый перевод с английского языка. Вы можете помочь проекту, переведя её до конца. В данной статье приведён список портов TCP и UDP, ко …   Википедия

  • cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction …   Universalium


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»