您要查找的是不是:
- You can reconfigure the SSL accelerator card to support the TLS protocol. 重新配置SSL加速卡以支持TLS协议。
- Disable the TLS protocol on the Internet Information Services (IIS) server, and use only SSL 3.0. 禁用Internet信息服务(IIS)服务器;上TLS协议并使用只SSL 3.;0。
- This paper at first introduces a security weakness which the first four encrypted bytes can be guessed in TLS protocol group. 提出了TLS协议组(SSL3.;0和TLS1
- And its formal analysis is presented using authentication test theory in the strand spaces.Finally its applications to TLS protocol are discussed. 用串空间的认证测试理论对其进行了形式分析,最后探讨了它在TLS协议中的应用。
- Recently, Application Layer VPN based SSL (Secure Socket Layer)/TLS (Transport Layer Security) becomes popular. An extension of TLS protocol, DTLS (Datagram Transport Layer Security) protocol is used to secure datagram transport. DTLS(Datagram Transport Layer Security)协议是TLS协议的变体,用于在不可靠传输网络上对应用层数据提供安全保护。
- Based on TLS protocol and proxy mechanism,this system can provide secure data transmission service and authentication service for unsecure applications without modifying their codes. 该系统基于TLS协议和代理机制,可在不修改原有应用代码的情况下,为不具备安全能力的应用提供安全的数据传输服务和身份认证服务。
- In this paper we discuss BAN logic and TLS protocol,we describe a process of analysis of TLS protocol using BAN logic,it can prove that the both authentication protocol of TLS is intact. 文章介绍了BAN逻辑和TLS协议,用BAN逻辑分析TLS协议,从而证明TLS协议的双方认证协议是完整的、没有漏洞的。
- In this paper we discuss BAN logic and TLS protocol, we describe a process of analysis of TLS protocol using BAN logic, it can prove that the both authentication protocol of TLS is intact. 文章介绍了BAN逻辑和TLS协议,用BAN逻辑分析TLS协议,从而证明TLS协议的双方认证协议是完整的、没有漏洞的。
- Digital signature enablement for TLS protocol 支持数字签名的TLS改进协议
- Taking TLS protocol for example, strand space model and theory extended are used to find an attack. In order to avoid the kind of attack, a piece of strategy to be paid attention to is put forward when cryptographic protocols are designed. 以TLS协议为例,利用扩展的串空间模型与理论分析,发现了一个攻击,为了避免此类攻击的发生,提出了设计密码协议时应注意的事项。
- If this is an HTTPS (secure) address, click tools, click Internet Options, click Advanced, and check to be sure the SSL and TLS protocols are enabled under the security section. 如果这是HTTPS(保证)地址:单击工具;单击因特网选项;单击高级的;和查检到的SSL和TLS协议是激活的.
- Study of Making up VPN with TLS Protocol Based on SOCKS V5 运用SOCKS V5/TLS协议构建VPN的研究与实现
- Weakness and Improvement of Encrypted Messages Guessed in TLS Protocol Group TLS协议组密底泄露缺陷及改进
- The Components and Design of The Firewall Based on SOCKS V5 & TLS Protocol 基于SOCKSV5/TLS协议的防火墙系统组成与设计
- The organizer was familiar with the protocol of royal visits. 组织者熟悉国王出访的礼仪。
- The delegates have to be seated according to protocol. 代表们须按礼仪要求就座。
- If the software or hardware environment is incompatible with the TLS protocol, use one of the following methods to work around the issue 如果与TLS协议,软件或硬件环境不兼容使用下列方法之一来解决此问题
- Select the protocol tab and un-check all protocol except modem. 选择Protocolstab, 不要选取所有的协议,除Modem之外。
- Use TLS to protect Unified Messaging network data. 使用TLS来保护统一消息网络数据。
- Use mutual TLS to reduce signaling eavesdropping. 使用Mutual-TLS可减少信号偷听。