1 results found for " encrypting ".

  • Authentication - Anti-DDoS

    methods: Token-based authentication: Requests are authenticated using a token. AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. This method is recommended because it provides higher security than token-based authentication. Token-based

Total Items:1