Especially when we use IP security protocol in the internal host password credentials to sign, on the basis of these marks strategy is undoubtedly more credibility for the host.
特别在当我们使用IP安全协议中的密码凭证来标志内部主机时,基于这些标志的策略对主机来说无疑更具可信性。
Some form of network-level encryption, such as a Virtual Private Network (VPN), perhaps using IP Security Protocol (IPSEC), is the most obvious solution, although there are other reasonable choices.
某种可能使用IP安全性协议 (IPSEC)的网络级加密形式(例如虚拟专用网 (VPN))是最可取的解决方案,虽然也有其他合理的选择。
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.
它具有实时数据流量分析和日志ip网络数据包的能力,能够进行协议分析,是网络安全领域的一个新兴的热点。
Then the thesis put forward to a kind of security protocol based on trusted third party and a kind of lightweight IP layer security mechanism, and analysed them in details.
然后提出了一种基于可信第三方的安全协议以及一种轻量级IP层的安全机制,对它们进行了详细的分析。
Compared with access authentication mechanism based on base mobile IP protocol, security and encryption for the mechanism are enhanced, which can resist common security att...
相比基本移动IP协议的接入认证方法,该方法的加密强度和安全性更高,可以更有效地抵御常见的安全攻击。
IPSEC protocol is a kind of network security standard which is framed by IETF organization for safe communication, and it can be used to provide security protection for IP and higher layer protocols.
IPSEC协议是IETF组织为在IP层提供安全通信而制定的网络安全标准,能为IP及其上层协议提供安全保证。
Because the devices which use lightweight IP protocol has limited resource, import the correlation security method will inevitably bring the influence to resource consumption.
由于轻量级IP设备的资源有限,引入相关的安全措施将不可避免地增加资源消耗。
Because the devices which use lightweight IP protocol has limited resource, import the correlation security method will inevitably bring the influence to resource consumption.
由于轻量级IP设备的资源有限,引入相关的安全措施将不可避免地增加资源消耗。
应用推荐