Примери за използване на Authenticating на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
shows on Telemundo Now after authenticating through your TV provider.
certificate that's used for authenticating to a Wi-Fi or VPN connection.
The vast majority of consumers- 93%- prefer biometrics over passwords for authenticating payments or other financial services.
Cntlm is an authenticating HTTP proxy intended to help you break free from the chains of the proprietary world we all are held prisoners in.
the need for a secure connection between the device and the authenticating server.
The legalization is the process of authenticating an official document intended for use outside of the country in which it has been issued.
Both the protocols are extremely secure and they are capable of authenticating clients without transmitting passwords over the network in any form,
Email addresses- these are necessary for authenticating Users before allowing their access to the Services,
These Authenticating Bodies could include entities such as WIPO
Cookies are used for authenticating, session tracking
The traditional method for authenticating public documents to be used abroad is called legalisation
providing services to businesses and governments, authenticating identities and protecting data.
services capable of authenticating data electronically;
UBB 3-D Secure is a free-of-charge service for authenticating a cardholder‘s identity during Internet transactions,
you also have the option of authenticating yourself and thereafter registering or logging in with your existing profile at one
you also have the option of authenticating yourself and thereafter registering or logging in with your existing profile at one
first authenticating users and then checking that they are authorised to perform a given action(recital 54).
If a user decides to log on to our site through an authenticating service of a third party such as Facebook Connect,
While both the protocols are capable of authenticating clients without transmitting passwords over the network in any form,
first by authenticating users and then by checking that they have the right to perform a particular action(recital 54 to the contested decision).