Examples of using Certificate-based in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Certificate-based digital signatures.
Public key encryption based key exchange and certificate-based identification.
Certificate-based training programme.
Choose between static-key based conventional encryption or certificate-based public key encryption.
Part 3: Certificate-based mechanisms.
Google andMozilla are taking action against the Kazakhstan government's certificate-based surveillance campaign for its citizens.
Proper certificate-based security architecture can help prevent this situation.
One way of accomplishing this is to implement a certificate-based authentication mechanism such as EAP-TLS.
Proper certificate-based security architecture can help prevent this situation.
Another form of authentication is commonly known as a“digital signature” andrequires people to sign with a certificate-based digital ID.
This certificate-based encryption is public domain and is supported by every current browser.
Similarly, we are seeing moreconnected device manufacturers showing interest in certificate-based authentication, encryption and device integrity.
Using a certificate-based Wi-Fi system works best and will improve the user experience significantly.
If the root CA is compromised or issues a certificate to an unauthorized entity,then any certificate-based security in your organization becomes vulnerable.
Certificate-based security also protects onboard communication between vehicle components and enables secure over-the-air software updates.
By using Akamai's solutions paired with certificate-based, two-factor authentication, we maximized the use of Tableau.
Certificate-based security also protects onboard communication between vehicle components and enables secure over-the-air software updates.
Full-strength encryption and certificate management, secure communications protocols(including HTTPS,WTLS and SSL), certificate-based application installation;
Deploying certificate-based authentication prevents users who have only a user name and password from synchronizing with Exchange 2007.
To that end, Akamai recommended ION and Kona Site Defender,complemented by AirWatch® for certificate-based, two-factor authentication of the enterprise application.
Deploying certificate-based authentication prevents users who have only a user name and password from synchronizing with Exchange 2010.
There are three primary types of authentication you can choose for Exchange ActiveSync:Basic authentication, certificate-based authentication, and token-based authentication.
Certificate-based authentication, on the other hand, does not rely on shared secrets, and enables mutual authentication, limiting the risk of man-in-the-middle attacks.
If you configure Exchange 2010 to require certificate-based authentication for Exchange ActiveSync, only devices that meet the following criteria can synchronize with Exchange 2010:.
Certificate-based smart cards offer strong multi-factor authentication in a traditional credit card form factor and enable organizations to address their PKI security needs.
To establish the SSL connection, certificate-based authentication requires the mobile device to have a valid client certificate that was created for user authentication installed.