协议的
- 与 协议的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
We propose a dynamic identity authentication scheme through a theorem about relative prime numbers, which can prevent replay attacks from taking place. In addition, we present a threshold signature scheme without a trusted party by use of joint secret sharing technique. Finally, the security flaw in an enhanced password authentication scheme is pointed out and the security of an enhanced key agreement protocol is analyzed.
首先基于一个关于互素数的定理设计了一个动态身份认证协议,该协议使攻击者不可能通过回放攻击来假冒用户;利用联合秘密共享技术设计了一个无可信中心门限签名方案;最后,分析了一个改进的身份认证协议存在的安全漏洞,以及一个改进的密钥协商协议的安全性。
-
Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. However, as a Strand space model, it is inclined to be used for the proof of correctness, and is relatively weaker for incorrectness analysis.
认证测试是一种新型的在Strand空间模型基础上发展而来的安全协议分析与辅助设计技术,可用于大部分协议的关联属性的分析;但是与Strand空间模型一样,它主要用于协议正确性证明,在协议为何不正确以及如何进行改进这个问题上处理分析能力较弱。
-
In chapter 6, an authentication protocol is proposed and the logical verification is done to it. It is proved that this protocol can satisfy the security requirement of Diffie's identity authentication protocol [37] and Janson and Tsuduk's key distributior protocol [39] . In addition, its ability of resisting the replaying attack has been discussed.
本文第六章中提出了一种鉴别协议,并对该协议进行了逻辑验证,证明它可以满足Diffie的身份鉴别协议的安全需求〓,以及Janson和Tsuduk的密钥分发协议的安全条件〓,另外还着重讨论了它是可以抵抗伪造攻击的。
-
After analysing the off-line negociation and on-line agreement supported by parlay specification,it gives out the drawbacks.
对组成服务水平协议的离线协议与在线协议的分析可知Parlay规范对服务水平协议的支持存在着极大的不足。
-
Efficient key management technology: SIKE is adopted, which is developed from IKE, has all advantageous of IKE. Only pre-shared authentication is used and the efficiency is improved.
高效密钥管理:采用密钥管理协议SIKE,该协议是IKE协议的一个发展版本,该协议具有IKE的所有优点,同时只采用IKE的预分发认证体制,使得系统的效率提高。
-
Any notices which any party may be required or shall desire to give hereunder or under this Agreement shall be in writing and in English and deemed to be effective when delivered personally or mailed by certified or registered mail, postage prepaid, or when transmitted if sent by telecopier, to the party to whom notice is to be given at the address first given above or such other address or addresses of which such party shall have given written notice.
本协议任何一方根据本协议的规定必须发出或打算发布的通知应以英文写成。本协议的通知须通过个人配送、认证邮箱或注册邮箱发送、邮局邮寄或传真等方式发送给协议方,通知发送到上述地址或双方专门指定的书面通知地址。
-
In such events, all royalties on sales theretofore made shall ecome immediately due and payable and no minimum royalties shall be epayable.
Excuse For Nonperformance 若由于政府法规的变化,或因国家紧急状态,战争状态和其他无法控制的原因,一方无法执行协议,书面通知对方原因和希望解除协议的意愿,则被许可方将被免除协议下的义务,本协议将终止,而基于销售额的使用费将立即到期应付,最低限度使用费将不会返还。
-
Primarily, the thesis assays the condition of network framework, the network was divided into three levels in terms of network management in order to establish the distributed method ,and still pointing out the intention and denotation of studying the Topology Discovery.Next, the thesis analyzes SNMP protocol minutely, including its development, principle, and the Network Management system that established on the SNMP protocol. Have analysed MIB in detail and the application way of MIB in network management .The thesis also assays the ICMP protocol, describing its working principle and the format of datagram minutely , and describing two important tools of ICMP- Ping and TraceRoute in detail. On the base of upper analysis, the thesis expounds a kind of distributed Topology Discovery project, and book it in one autonomy system. Topology Discovery was divided into two levels in terms of network management, and analyses the way of linking up between the two level. The thesis minutely assays Router-Level Topology Discovery technology basing on SNMP and Subnet-Level Topology Discovery technology basing on ARP and ICMP. According to these analyses, the thesis explores the specific methodology and the technology of XML data object which using the WinSNMP API to achieve topology discovering system on the development platform of Visual C++, and also analyses the technology of topology analysis and topology graph minutely. Moreover, the thesis assays the technology of basic firewall and Topology Discovery response strategy. Finally, the thesis analyses the underlying blind problem of the topology finding, and also analyses the reason that the blind problem produced and the way that reduced. The distributed algorithm that this paper puts forward has a certain directive significance in wireless network or other fields.
本文首先分析了网络结构状况,将网络从网络管理的角度划分为三个层次,为分布式的方法奠定了基础,同时还指出拓扑发现研究的目的及意义;接着本文分析了SNMP协议,详细分析了SNMP协议的发展状况,协议的工作原理,以及由SNMP协议基础上建立的SNMP网络管理体系,详细分析了MIB,以及MIB在网络管理上的应用方式;本文又分析了ICMP协议,详细描述了ICMP的工作原理和数据报格式,并详细描述了ICMP的两个重要工具-Ping 和TraceRoute;然后本文在结合上述分析的基础上,提出了一种分布式的拓扑发现方案,将拓扑发现拟订在一个自治系统内,将拓扑发现从网络管理角度划分为路由器级和子网级两个层次,分析了两个层次之间的衔接方式,同时从拓扑地域的角度将拓扑发现过程分布化,分析了分布式算法的具体方法和分布式结点之间的数据通讯方法,本文详细分析了基于SNMP的路由器级拓扑发现技术和基于ARP和ICMP的子网级拓扑发现技术;根据这些分析,本文利用XML数据对象作为分布式算法中的数据对象,分析了XML的技术,本文使用Visual C++开发平台实现网络拓扑发现系统,详细分析了使用WinSNMP API实现基于SNMP的路由器级拓扑发现和基于ARP的子网级拓扑发现,分析了使用Winsock编程实现基于ICMP的子网级拓扑发现,本文还对拓扑分析和拓扑图的绘制技术作了较细致的分析;本文最后还分析了基本防火墙技术,分析了几种类型的防火墙对拓扑发现带来的影响,以及在拓扑发现时的应对策略,本文还分析了拓扑发现中可能产生的盲点问题,分析了盲点产生的原因以及拓扑发现中减少盲点的方法。
-
The legal force of a valid arbitration agreement reflects not only in the parties, arbitration institution courts, but also in the reparability Doctrine.
仲裁协议的法律效力表现在仲裁协议对当事人具有约束力;对仲裁机构的效力;对法院的效力。仲裁协议具有相对的独立性,这是国际商事仲裁协议的特点。
-
In order to get useful data, it researches the network sniffing technology based on Raw Socket and mainly studies the technology of protocol analyze and data recombine. And it introduces the Trojan horse technique to the network data collection part, improves the process hiding technique, uses the triple-thread technique, and so on. It ensures the imperceptibility and stability of the network data collection part. Then this paper develops pseudo hypertext transfer protocol based on HTTP. This protocol is used in the communication between the network data collection part and the service part, which make the communication more covert.
研究基于Raw Socket的网络监听技术,为了能取到敏感数据,还对协议解析和数据重组技术做了详细研究;并在网络数据采集端引入了木马技术,对进程隐藏技术做了改进,采用三线程技术等,来保证网络数据采集端的隐蔽性和稳定性;接下来本文在分析HTTP协议的基础上设计开发了PHTTP协议,该协议用于网络数据采集端与服务端之间的数据通信,使通信更加隐蔽。
- 推荐网络例句
-
With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.
随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。
-
But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.
不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。
-
Closes the eye, the deep breathing, all no longer are the dreams as if......
关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。