入侵探测系统(IDSes)等现有的安全解决方案不了解探测不正当活动所需的数据库协议和结构。
Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.
PAM的体系结构是模块化的,这意味着它设计为可以通过交换模块,支持从一个安全协议组件无缝地转换到另一个协议组件。
PAM's architecture is modular, which means it's designed to support the seamless exchange of one security protocol component for another by swapping out modules.
提出了这类接入结构上的一个信息论安全的高效可验证秘密分享协议。
An information-theoretical secure verifiable secret sharing protocol on this kind of access structures is proposed.
接着在此基础上介绍安全策略协商模型的系统结构,主要包含协商协议,协商对象,协商策略等部分。
Then it gives the structure of security policy negotiation model including negotiation protocol, negotiation object and negotiation tactics etc.
其二,分析ARP协议的实现细节,采用ARP欺骗技术实现安全加密路由平台对原有网络结构的彻底透明。
The other one is to analyze Address Resolution Protocol (ARP) and implement the transparency of the security and encryption route platform to the original network structure by ARP cheat technology.
在此基础上详细说明了PROFIBUS - DP协议的结构,包括数据传输报文、安全机制和可用的传输服务。
In addition, the structure of the PROFIBUS-DP protocol including data transmission messages, security mechanism and the available transmission services were also analyzed in details.
它优化了SET协议的模型结构,完善了交易流程,增强了交易的安全性。
The model structure of SET protocol is optimized, the transaction process is improved, and the transaction security is strengthened.
文章简述了SSLv3.0的分层结构、协议状态、握手协议和加密参数计算,并对其安全性做出分析。
This article briefly states the layer structure, the states, handshake protocol and cryptographic calculation of SSL V3.0, and analyses its security.
给出了电子礼券系统的完整设计方案,包括功能设计、系统结构设计、安全性设计、数据库设计、协议设计。
Proposing the technical scheme of the electronic gift certificate system, include the function design, system framework design, safety design, database design and protocol design.
然后,阐明了无线应用协议WAP的原理和体系结构,以及移动设备的安全技术和移动电子商务的应用领域;
Then we expound the principle and architecture of WAP, security of mobile devices and application fields of mobile electronic commerce.
基于树结构与门限的思想,王志伟等人提出了一个高效的组密钥协商协议(TTS协议),并认为他们的协议是安全的。
Based on tree and threshold idea Wang et al. proposed an efficient group key agreement protocol (TTS) and claimed that their protocol is secure.
适应快速查找需要的安全协议数据库(SPD)和安全关联数据库(SAD)的硬件结构设计。
The hardware design of security policy database (SPD) and security association database (SAD) which are suitable for fast lookup.
第2章探讨了SET协议的体系结构和SET支付流程。SET协议的体系结构包括SET支付系统结构和SET安全体系结构。
The architecture of SET and SET payment flow have been discussed in Chapter 2. The architecture of SET includes SET payment architecture and SET security architecture.
在前面讨论的基础上,在组成员方提出了一个基于GDOI协议的安全多播主机结构模型,描述了各个模块的设计思想,给出了主要数据结构和源程序。
On the basis of discussing above, a security multicast system model based on GDOI Protocol is proposed. The design idea is described and the main data structures and source programs are provided.
在前面讨论的基础上,在组成员方提出了一个基于GDOI协议的安全多播主机结构模型,描述了各个模块的设计思想,给出了主要数据结构和源程序。
On the basis of discussing above, a security multicast system model based on GDOI Protocol is proposed. The design idea is described and the main data structures and source programs are provided.
应用推荐