This system adopted SET protocol as the basic flow frame of the payment system to ensure the system high security.
此系统采用SET协议作为电子支付的基本流程框架,保证系统具有高度的安全性;
To increase the security and the expansionary of the system, it uses SIP as a core protocol.
为增加系统安全性和可扩展性,采用下一代互联网络的核心协议—SIP作为控制信令协议。
From an application system, this paper analyzes the privacy and authenticity of a security protocol in the electronic fund transfer system with a formal proof method.
从一个实用系统出发,采用形式化的证明方法,分析了电子资金转帐系统中安全协议的保密性和可鉴别性。
In the detail implementation, several techniques are adopted to insure the system security, including TLS protocol and a Local Application Service Token creation method.
在具体实现上,采用多种技术保证系统的安全性,包括TLS协议,本地应用服务令牌生成方法等。
The system USES a dual-factor authentication method and a digital certificate authentication protocol during the process of authentication, which strengthens the security of the system effectively.
在认证过程中,本系统采用双因素认证方法和数字证书强认证协议,有效增强系统的安全性。
This paper follows the RADIUS authentication protocol, J2EE and CORBA system standard specifications, according to the distributed, scalability and security requirements for the designed system.
本文遵循RADIUS认证协议,J2EE技术规范和CORBA体系规范,根据分布式、扩展性和安全性要求来设计系统。
Encryption technology, security system and security protocols are the major supports for present business transaction, while security protocol usually adopts SSL and SET protocol.
而商务交易安全主要是通过加密技术、安全机制、安全协议进行保证的。电子商务中的安全协议主要采用SSL协议和SET协议。
This paper mainly focuses on key exchange protocol based on dynamic password authentication, which can insure the security of both authentication and transportation of VPN system.
本文主要研究基于动态口令认证的密钥交换协议,该协议既能保证VPN的认证安全,又能保证VPN的传输安全。
Tests basing on the modules of detection system constructed in this thesis show that the expected security, flexibility and effectiveness are achieved in the protocol.
通过构建的检测系统模块测试,可以看到该协议确实达到了预期目的:安全性、灵活性和有效性。
The details of each protocol in our new E-cash system are described thoroughly. In addition, the security proofs and efficiency analysis...
本文详细描述了系统的各个协议,并给出了相应的安全性证明和效率分析。
On the basis of discussing above, a security multicast system model based on GDOI Protocol is proposed. The design idea is described and the main data structures and source programs are provided.
在前面讨论的基础上,在组成员方提出了一个基于GDOI协议的安全多播主机结构模型,描述了各个模块的设计思想,给出了主要数据结构和源程序。
The details of each protocol in our new E-cash system are described thoroughly. In addition, the security proofs and efficiency analysis are given in...
本文详细描述了系统的各个协议,并给出了相应的安全性证明和效率分析。
The component, work protocol and security feature of the proposed sys-tem are described by full discussion. Finally a application case of the system is illustrated.
在设计和分析系统的组成和结构模块后对提出系统的安全性进行讨论,最后用实例对方案的应用实施进行说明。
Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.
无线异构网络中的关键安全技术包括安全路由协议、接入认证技术、入侵检测技术、节点间协作通信等。
Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.
无线异构网络中的关键安全技术包括安全路由协议、接入认证技术、入侵检测技术、节点间协作通信等。
应用推荐