Network security protocol is important factor in computer network security.
网络安全协议模型是计算机网络安全中的重要因素。
While the former can be accomplished via use of Kerberos (see Resources) and similar network security protocol, the latter requires special administrative tuning.
尽管前者可以通过使用Kerberos (参见参考资料)和类似的网络安全协议完成,但是后者需要特殊的管理调优。
Secure Sockets Layer (SSL) protocol is a cryptographic protocol that provides privacy and security for data communication over the network.
SecureSocketsLayer (SSL)协议是一种加密协议,可为网络上的数据通信提供隐私和安全保障。
Some form of network-level encryption, such as a Virtual Private Network (VPN), perhaps using IP Security Protocol (IPSEC), is the most obvious solution, although there are other reasonable choices.
某种可能使用IP安全性协议 (IPSEC)的网络级加密形式(例如虚拟专用网 (VPN))是最可取的解决方案,虽然也有其他合理的选择。
Under the award, BBN Technologies will work on the second phase of the Military Networking Protocol program to enhance network security and performance, according to a July 13 company announcement.
根据7月13日的公司公告称,根据合同,雷神BBN技术公司将开始军事网络协议项目的第二阶段工作,以提高网络的安全和性能。
A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.
一个安全的认证协议能有效抵御恶意的攻击者对通信网进行的欺诈,保证通信网的安全运行。
Base on Simple Network management Protocol (SNMP) design an Antivirus module of net security management platform. The Antivirus module use the SNMP alarm and remote management of Antivirus software.
利用网络防病毒软件的SNMP报警机制及其远程管理功能,设计一种基于SNMP简单网络管理协议的网络安全管理平台反病毒模块。
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.
它具有实时数据流量分析和日志ip网络数据包的能力,能够进行协议分析,是网络安全领域的一个新兴的热点。
This paper presents a kind of secure communication protocol model-EABRA, by which network security communication can be realized easily and efficiently.
提出了一种安全的通信协议模型EABRA,通过该模型可以简单有效地实现网络安全通信。
Formal authentication of security protocol is an important field of network security.
安全协议的形式化验证是网络安全的一个重要领域。
Analysis shows that this protocol guarantees the security, atomicity, accountability and impartiality of network online payment.
分析表明,本协议可以保证网络在线支付交易的安全性、原子性、可确认性和公平性。
This paper mainly discusses the influence of network performance under internal attacks in MANET and security routing protocol.
本文主要研究移动自组网络中内部攻击对网络性能的影响以及安全路由协议。
In this paper, using SSL protocol we mainly research on the application of PKI in information security on network.
以PK I技术为基础,应用ssl协议,研究PK I技术在保障网络信息传输安全上的应用。
The other one is to analyze Address Resolution Protocol (ARP) and implement the transparency of the security and encryption route platform to the original network structure by ARP cheat technology.
其二,分析ARP协议的实现细节,采用ARP欺骗技术实现安全加密路由平台对原有网络结构的彻底透明。
An idea about the security transfer on network, which is based on the SSL3.0 protocol, is also put out at the end of this paper.
最后,本文还在深入分析SSL3.0协议的基础上提出了一个网络应用安全传输的构想。
The security protocol verification is one of the important projects in the domain of network security.
安全协议认证是网络安全领域中重大课题之一。
This paper, by analyzing internal work principle of ARP protocol, researches on security of library network.
本文基于数据链路层地址解析协议ARP的内部工作原理,研究了图书馆网络的安全防范问题。
Security protocol is a very important role in securing network communication, and the formal analysis method for security protocol becomes one of the hottest research topics in security field.
保障网络通信安全的一个极其重要的环节是安全协议,安全协议的形式化分析方法已成为近年来安全领域研究的热点之一。
Recently, analysis and improvement of IKE protocol has become a hotspot in network security area.
近年来,对IKE协议的分析和改进已成为网络安全领域的一个研究热点。
The size of computer networks has made network security a critical issue. Protocol security and algorithm security are two fundamental aspects of network data security.
网络的普及使得网络安全问题日益重要,协议的安全性和密码算法的安全性是网络数据安全的两个最基本的概念。
On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.
在此基础上,提出了校园网安全方案,重点介绍了网络访问控制、端点安全保护、协议分析和网络安全监控等相关技术。
Research on unknown network protocol reverse parsing is of great significance in many network security applications.
研究未知网络协议逆向解析技术在网络安全应用中具有重要的意义。
The complex network environment which leads attackers making use of the flaws of protocol to demolish the world, at the same time brings difficulties in confirmation of security of protocols.
复杂的网络环境使攻击者可以利用通信协议自身的缺陷来实施各种各样的攻击,也给确保协议的安全性带来较大难度。
IPSEC protocol is a kind of network security standard which is framed by IETF organization for safe communication, and it can be used to provide security protection for IP and higher layer protocols.
IPSEC协议是IETF组织为在IP层提供安全通信而制定的网络安全标准,能为IP及其上层协议提供安全保证。
This paper summarizes network security definition and the solution policies and the security technology. It also introduced how to construct the security management protocol of a computer network.
本文简述了网络安全问题的定义及解决策略和安全技术,并提出了如何建立网络的安全管理机制。
This paper summarizes network security definition and the solution policies and the security technology. It also introduced how to construct the security management protocol of a computer network.
本文简述了网络安全问题的定义及解决策略和安全技术,并提出了如何建立网络的安全管理机制。
应用推荐