Examples of using Iteration count in English and their translations into Dutch
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Computer
-
Ecclesiastic
-
Official/political
-
Programming
Fixed password hash upgrade when changing the iteration count.
When the iteration count gets down to 1 S/Key must be reinitialized.
your login name, the iteration count, and seed.
Figure 8 shows the smallest iteration count across both initial estimates.
The iteration count is decremented after each successful login to keep the user
The key program needs both the iteration count and the seed as command line options.
the relevant credentials files(/etc/opiekeys) and print out the invoking user's current iteration count and seed.
When the iteration count gets down to 1,
opieinfo programs examine the relevant credentials files(/etc/skeykeys or/etc/opiekeys) and print out the invoking user's current iteration count and seed.
They need both the iteration count and the seed as command line options.
then applying the MD4/MD5 hash as many times as specified by the iteration count and turning the result into six short English words.
If the maximum iteration count is too small,
then applying the MD5 hash as many times as specified by the iteration count and turning the result into six short English words.
The yellow area at the top right indicates an iteration count that is larger than in any non-yellow area
and reduce the iteration count by at most a few, so that it doesn't seem worth the effort to include them in the procedure.
Strong protection(also known as iteration count) is enabled by default in the Certificate Export Wizard when you export a certificate with its associated private key.
to change passwords, iteration counts, or seeds; they take either a secret passphrase,
The opiepasswd program is used to initialize OPIE, and to change passwords, iteration counts, or seeds; it takes either a secret passphrase,
Because a one-way hash is used it is impossible to generate future one-time passwords if a successfully used password is captured; the iteration count is decremented after each successful login to keep the user
Figure 7 shows the iterations count for this initial estimate, similar to Figure 6.
Figure 9 shows the iterations count for this initial estimate,
Figure 8 shows the iterations count for this initial estimate,
Figure 14 shows the iterations count for solving Kepler's Equation using an implementation of the abovementioned procedure in C++ on a 64-bit GNU/Linux system,