In this paper, we use P2P file-sharing system as the background to explore the P2P security.
本文以P 2 P网络中的文件共享领域的应用作为探讨的背景,探讨P 2 P安全问题。
In the third one, the design model based on the sharing technology of the security resources is setup in order to improve the P2P security.
第三部分提出了一种基于P 2 P的安全资源共享以提高P 2 P安全性的设计模型。
It provides user and role based security, which is one of the most important aspects of P2P for an organization.
它能够提供用户和基于角色的安全保证,而这对于企业级应用的P 2 P是最重要的一个方面。
The model can effectively build up a high efficient and reliable trust relationship between peers, prevent malicious attack and enhance security and efficiency of the P2P networks.
利用该模型可以在两个对等实体之间建立高效、可靠的信任关系,有效防止恶意攻击,提高P 2 P网络的效率和安全。
As the only P2P company worldwide to have a risk rating and with the added benefit of our Provision Fund, we are becoming the go-to P2P provider for investors looking for both security and return.
因为我们是P 2 P公司在全世界范围内经过测评风险的唯一一家,加之准备金所获得的利益,对于同时寻求安全性与回报率的投资者来说,我们正在成为理想的P 2 P提供商。
P2P Electronic Commerce greatly enhances the conveniency and flexibility of e-business, on the other hand that aggravates the risk and security threatening of business activity.
P2P电子商务比传统电子商务更方便、更灵活,但用户所涉及的风险和安全威胁也越大,各种网络诈骗层出不穷。
In this paper, according to the information security in enterprises, campuses and other organizations and institutions, an P2P-based network confidential inspection system NSSP is proposed.
针对企业、校园等组织和机构中的信息安全保密工作,提出一个基于P 2 P的网络保密检查搜索系统NSSP。
With the popularization and application of P2P network in enterprise environment, security becomes more and more important.
随着P 2 P网络越来越多地应用于企业环境,安全问题变得越来越重要。
The paper analyzes the security of P2P network and puts forward the correspond countermeasure.
本文对P2P网络的安全性进行了分析,并提出了相应对策。
Traditional security technology, such as security protocols, digital certificate, can be used to solve some security problems in P2P.
为了解决P 2 P的安全问题,可以采取传统的安全技术,如安全协议、数字证书等等。
The widely used P2P file share software has incurred a significant threat to the modern network security.
点对点(P2P)文件共享软件的广泛应用对现有的网络安全造成严重的影响。
On this basis, I analyze and summarize the existing security mechanisms for P2P network, and point out some possible problems.
在此基础上,对几种现有的P 2 P网络中的安全防范机制进行了总结和分析,并指出了其可能存在的问题。
P2P network technology offers information resource for people, it increases availability and robustness of P2P network, but brings new security problems of network too.
P 2 P网络技术在使人们享受信息资源,增强网络可用性、健壮性的同时,也带来了新的网络安全问题。
Because of the distribution of peer in P2P system, concentrative security control method is difficult to work efficiently.
由于P2 P系统节点的分布性,集中式的安全控制方式难以有效使用。
In response to these security issues, describes how to build a P2P network security defense system.
针对这些安全问题,介绍了如何构建P 2 P网络的安全防御体系。
This system made remarkable progress in reducing transmission delay, controlling network transmission scope, and enhancing P2P network security and management.
该系统在降低流媒体传输延迟、控制网络传输范围、提高P2P网络安全性和可管理性等方面都有显著进步。
However, P2P network is short of centralized control so that the security in P2P network is faced with much challenge.
但是,由于P2 P网络缺乏集中控制,使得P 2 P网络的安全成为一个突出的问题。
P2P model on the IPV6 can solve problem of security and control in the network finally.
IPV 6上的P 2 P模式能最终解决网络上的安全管理问题。
A ploy to ensure the security distribution of the key and the identity authentication of the peers in P2P network is provided in this paper.
文章提出了一种在P 2 P网络中安全分发密钥和进行对等点身份认证的方法。
Then it introduces BEEP protocol frame in detail, and the advantage in P2P s protocol design, especially in realizing the security of P2P.
介绍了新兴网络模型P 2 P,叙述了BEEP协议框架及其在P 2 P协议设计中的应用,尤其是在实现P 2 P的安全性方面的应。
How to provide access control function for CSCD based on P2P network to make the cooperative design more security, it has become a key question studied at present.
如何给基于P 2 P网络的协同设计提供合适的访问控制功能,使人们可以更安全的进行设计活动,已经成为一个急待解决的问题。
With the abroad application of P2P software, the security problem has become the focus of research.
随着各种P2P软件的广泛应用,P2P网络中安全问题已经成为一个研究的热点。
Currently, the research of p2p is focused on resources location based on distributed hash table and transaction security based on trust mechanism between peers.
当前对等网络研究的重点是基于分布式哈希表的资源定位问题,以及基于节点间信任机制的交互安全问题。
Talk to your kids about the security and other risks involved with file-sharing and how to install the software correctly, if they're going to use P2P file-sharing at all.
如果你的孩子要使用P 2 P文件共享,告诉他们关于文件共享过程中的安全和其他风险,以及如何正确安装软件。
Now P2P network has been rapidly developed, but it faces a lot of security problems because of the structural characteristics.
目前P 2 P网络得到了迅猛发展,但由于其本身的结构特点使之面临很多的安全问题。
Until now, there have appeared more than 40 famous P2P systems, which deal with resource sharing, cooperate computing, instant message and system security.
到目前为止,于P2P相关的著名系统已经超过40个,涉及到了资源共享,协同计算,及时短信服务,系统安全等方面;
However, a P2P system is large in scale, whose component nodes are dynamic, strange to each other and lack of necessary mutual trust. The security issues are very serious in P2P system.
然而,P2 P网络规模大,节点动态性强,交易的节点大多为陌生节点,节点间缺乏必要的信任关系,安全问题十分突出。
Data security technology, data security protocols and P2P technology are the effective measures for Online Privacy protection.
网络信息安全技术、信息安全协议、P 2 P技术成为网络隐私安全保护的有效手段。
Meanwhile, it ensures the secure storage and access of trust data and enhances the anonymity and security in the transaction of P2P network.
同时也保证了信任数据的安全存储和访问,同时增强了P 2 P网络中交易的匿名性和安全性。
Meanwhile, it ensures the secure storage and access of trust data and enhances the anonymity and security in the transaction of P2P network.
同时也保证了信任数据的安全存储和访问,同时增强了P 2 P网络中交易的匿名性和安全性。
应用推荐