• Recently, analysis and improvement of IKE protocol has become a hotspot in network security area.

    近年来IKE协议分析改进成为网络安全领域的一个研究热点。

    youdao

  • This article introduces IKE protocol at first, then makes formal analysis on a certain key exchange mode by logical method, and proves the correctness of IKE.

    该文首先介绍ike议,然后协议中一种具体密钥交换模式的安全性使用逻辑方法进行证明得出关于协议正确性的结论。

    youdao

  • The author designs and realizes the second edition of PFKEY protocol, which is mainly responsible for providing the interface for communication between IKE and Kernal secure database.

    设计实现了PF_KEY第二协议协议主要负责提供IKE内核安全数据库进行通信接口

    youdao

  • The paper prominently designed and implemented the PF_KEY V2 protocol, which mainly provides the communication interface between IKE and SADB.

    重点设计实现PF_KEYV2协议协议主要负责提供IKE内核安全数据库进行通信接口

    youdao

  • A black box testing method aiming at IKE (Internet Key Exchange) protocol performance was proposed, which was based on the self-developed platform of protocol integrated test system.

    提出一种针对密钥交换(IKE)协议性能测试方法方法基于自主开发的协议集成测试系统平台

    youdao

  • A black box testing method aiming at IKE (Internet Key Exchange) protocol performance was proposed, which was based on the self-developed platform of protocol integrated test system.

    提出一种针对密钥交换(IKE)协议性能测试方法方法基于自主开发的协议集成测试系统平台

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定