...源期刊网 关键词:普适计算; 安全协议设计; 组合方法 [gap=840]Key words:ubiquitous computing; security protocols design; composition method ...
基于24个网页-相关网页
Design and implementation approaches for IKE protocols in the security VPN server are studied in this paper.
研究了安全VPN服务器中ike协议的设计与实现方法。
The key technology of mobile value-added services is to design protocols, which can meet the poor computing power as well as being security.
移动通信增值服务的关键技术之一就是设计既满足较差计算性能又具有良好安全性的协议。
The logic can be used not only to analyze security protocols, but also to design security protocols.
该逻辑不但可以用来分析安全协议,而且可以用来设计安全协议。
应用推荐