authenticated$97055$ - traducción al holandés
Diclib.com
Diccionario ChatGPT
Ingrese una palabra o frase en cualquier idioma 👆
Idioma:

Traducción y análisis de palabras por inteligencia artificial ChatGPT

En esta página puede obtener un análisis detallado de una palabra o frase, producido utilizando la mejor tecnología de inteligencia artificial hasta la fecha:

  • cómo se usa la palabra
  • frecuencia de uso
  • se utiliza con más frecuencia en el habla oral o escrita
  • opciones de traducción
  • ejemplos de uso (varias frases con traducción)
  • etimología

authenticated$97055$ - traducción al holandés

INTERACTIVE METHOD FOR TWO OR MORE PARTIES TO ESTABLISH CRYPTOGRAPHIC KEYS BASED ON ONE OR MORE PARTY'S KNOWLEDGE OF A PASSWORD
PAKE; Password Authenticated Key Exchange; Password-authenticated key exchange

authenticated      
adj. bevestigd (kreeg bevestiging)
authenticated copy         
  • ATM user authenticating himself
  • A [[security hologram]] label on an electronics box for authentication
  • NSA KAL-55B Tactical Authentication System used by the U.S. military during the [[Vietnam War]] – [[National Cryptologic Museum]]
  • A military police officer checks a driver's identification card before allowing her to enter a military base.
ACT OF CONFIRMING THE TRUTH OF AN ATTRIBUTE OF A DATUM OR ENTITY, OFTEN USED AS PART OF ACCESS CONTROL
Authenticate; Authentification; Authentication factor; Authentication factors; Authenticated copy; Forgery detection; AuthN; Authentications; Authenticates; Authenticated; Authenticating; Authn; Client authentication; Server authentication; Service authentication; Product authentication; Single-factor authentication; Continuous authentication
onvervalst kopie

Definición

authenticate
v. (D; tr.) to authenticate as (the painting was authenticated as genuine)

Wikipedia

Password-authenticated key agreement

In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party's knowledge of a password.

An important property is that an eavesdropper or man-in-the-middle cannot obtain enough information to be able to brute-force guess a password without further interactions with the parties for each (few) guesses. This means that strong security can be obtained using weak passwords.