查询词典 protocol
- 与 protocol 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
This paper proposes a two-player, finite-horizon differential game model to analyzejoint implementation in environmental projects, one of the flexible mechanisms considered in the Kyoto Protocol.
提出了一个两人有限微分对策模型用以分析在环境工程项目中的联合行动,其灵活机制之一已在京都议定书中得到了考虑。
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
-
The system is composed of trust model, structure and function design, certificate database design, and implements the core functions of a standard CA system including signing, issuing and revoking certificates. The security communication modular of the system is based on the SSL Protocol to enhance the security of system communications. Besides, the kernel functions of the system are packed into DLL library, including symmetrical encryption algorithms, digest algorithms, digital signature algorithms and certificate operations such as certificate request, certificate building, certificate format conversion etc.
本文的主要工作是:在研究PKI相关技术的基础上,设计了企业CA系统方案,包括信任模型、结构和功能设计、证书库的设计;实现CA系统中最为核心的数字证书管理,提供数字证书的签发、注销和发布等各项功能;实现了基于SSL协议安全通信模块,增强了系统通信的安全性;系统采用动态链接库技术封装了对称加密算法、数字摘要算法、签名算法以及证书处理(包括证书请求、证书生成、证书格式转换等功能),以动态链接库的形式提供调用接口,成为应用的安全基础设施。
-
DIGITAL SUBSCRIBER SIGNALLING SYSTEM NUMBER ONE (DSS1) PROTOCOL.
数字用信号系统数字(DSS1)协议。
-
Digital subscriber signalling system no One (DSS1) protocol.
数字用户信令系统No.1(DSS1)协议。
-
Digital substriber Signalling System n o one protocol.
数字用户信号系统第1号协议(DSS1)。
-
Objective: To establish a protocol of rapid clonal propagation of Dioscorea zingiberensis using mature leaves as explants.
中文摘要:目的:以成熟叶片为外植体,建立一套盾叶薯蓣 Dioscoreazingiberensis 的快速繁殖技术。
-
Article 6 (1) Each of the Contracting States shall notify through the diplomatic channel to the other the completion of the procedures required by its law for the bringing into force of this Protocol.
一、缔约国各方应通过外交途径通知对方完成本议定书生效所需的法律程序。
-
But, for the commercial instruments used worldwide, evidence material that is obtained by the embassies or consulates stationed abroad of our country, evidence material that is obtained though Protocol of Mutual Justice Assistance or through diplomatic channel and the evidence material consented by both parties, shall not be subject to notarization, authentication or other identification procedures.
但是,对于用于国际流通的商业票据、我国驻外使领馆取得的证据材料、通过双边司法协助协定或者外交途径取得的证据材料以及当事人没有异议的证据材料,则无需办理公证、认证或者其他证明手续。
-
Meanwhile,a converse-searching algorithm based on directed graph is also presented to construct the protocol messages.
用该算法分析Woo-Lam认证协议,找到了该协议一种新的攻击方法及其攻击路径。
- 推荐网络例句
-
With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.
随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。
-
But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.
不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。
-
Closes the eye, the deep breathing, all no longer are the dreams as if......
关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。