您要查找的是不是:
- On the Networking tab, you can change the type of secure protocol. 在网络选项卡上,您可以更改安全协议的类型。
- In your browser , you can tell when you are using a secure protocol, such as TLS, in a couple of different ways. 在用户的浏览器中用户可以有许多不同的方式知道何时使用了如TLS之类的安全协议。
- In IPSec protocol, automatic secure parameters negotiation of the security protocol is realized by IKE. IPSec协议使用IKE协议实现安全协议的自动安全参数协商。
- It can implement some security protocol -such as IPSec, PPTP, SSL, IKE. 它可以代替软件来实现一些安全通讯协议,如IPSec,PPTP,SSL,IKE等等。
- In this paper, a bilateral-authentication cryptographic protocol is proposed.It is a more efficient and secure protocol, which solves the bottleneck problem of the trusted third party. 提出了一个双向的认证密码协议,解决了可信第三方的性能瓶颈问题,是一个更为有效的、安全的密码协议。
- Verifiable secret sharing, group signature and signature of knowledge are useful in protecting important and sensitive information and always used in designing secure protocol of cryptology. 可验证秘密共享、群签名和知识签名是保护重要而敏感信息的有用工具,常用于设计安全的密码协议。
- Provides a stream used for client-server communication that uses the Secure Socket Layer (SSL) security protocol to authenticate the server and optionally the client. 提供一个用于客户端-服务器通信的流,此流使用安全套接字层(SSL)安全协议对服务器及客户端(可选)进行身份验证。
- This is part of our security protocol to avoid Double claiming or unscrupulous acts by participants Of this program. 这些是我们安全条例的一部分,防止参与者重复领奖或无理行为。
- The passcode is 1234?! Passcodes like that are in direct violation of Code 12 of the UAC Security Protocol Handbook! 密码是1234?像这样的密码简直就是直接违反UAC安全议定手册上的第12号法规嘛!
- Guttman, the other is Athena which is a new efficient automated approach for security protocol proposed by D. Song. 其二是Song在串空间模型上提出的Athena方法。
- Which wireless security protocol cannot use digital certificates for both the supplicant and authentication server? 下列哪个无线网路安全协定无法在用户端与验证伺服器上使用数位凭证??
- The Kerberos authentication protocol is a security protocol that verifies data to help ensure that both user and network services are safe. Kerberos身份验证协议是一种安全协议,用于验证数据以帮助确保用户和网络服务均是安全的。
- Using JXTA Security protocol to protect information security of the system offers the system a good safety, reliability and robustness. 应用JXTA的安全协议保障系统信息安全,使该系统具有良好的安全性、可靠性及鲁棒性。
- We presented a Security Protocol for Ubiquitous Environments (SPUE), which provided data authentication, and data freshness besides unobtrusiveness. 它满足数据认证、数据新鲜性等安全特性,同时满足普适计算的“ 无需人干预的”性质。
- With the widespread use of PKI technology and SSL Security protocol, by use of SSL in Web, the provision of safe data communication is very important. 随着PKI技术和SSL安全协议的广泛应用,在Web服务中利用SSL协议,提供安全的数据通信是非常重要的。
- Most experts agree that DNSSEC (DNS Security), the DNS security protocol hammered out by the IETF 10 years ago, would make DNS close to bulletproof. 多数专家同意,由IETF(因特网工程任务组)10年前提出的DNSSEC(DNS安全)协议可使DNS防止那样的攻击。
- SET protocol proposed by MasterCard,Visa Card,Microsoft and IBM is a security protocol solution to secure payment of credit card on internet. Its workflow and specification accorded with traditional one. SET协议是一种解决互联网上信用卡安全交易的安全协议,其工作流程符合传统的信用卡工作流程和规范。
- The passcode is 1234?! Passcodes like that are in direct violation of Code 12 of the UAC Security Protocol Handbook! Doesn't anyone read the handbook anymore? 密码是1234?像这样的密码简直就是直接违反UAC安全议定手册上的第12号法规嘛!难道就没有人多读读那个手册吗?
- The author construct a security model of engineering drawings management,including user authentication,the security protocol in storage of drawings files and XML access control. 在分析现有类似系统的不足及工程图档设计工作流后,构造了基于XML的工程图档管理安全模型,分用户认证、图档存储安全协议和基于XML的存取控制三个相关联的方面来实现。
- IPSec security protocol, Internet key exchange (IKE), the work principle and process of each constituent of IPSec protocol are analyzed and researched systematically. 3. 2.系统地研究分析了 IPSec 安全协议和密钥管理协议(IKE),IPSec 协议各个组成部分的工作原理和过程。