您要查找的是不是:
- IP Security Protocol (IPSec) is the standard security IP protocols defined by the Internet Engineering Task Force (IETF) , and it provides cryptographically-based security at network layer . IP安全协议IPsec是IETF制定的安全IP协议建议标准,在网络层提供基于密码学的安全服务。
- This paper briefly introduces TCP/IP and the IP security protocol suite IPSec; 本文简介了TCP/IP和IP安全体系结构IPSec;
- IP Security Protocol 安全协议
- IP security protocol (IPsec) IP安全性协议(IPsec)
- IP security protocol(IPSec) IP安全协议
- IKE (Internet Key Exchange) Protocol is one of important protocol of IPSec (IP Security) Cluster which handling dynamic negotiation and administration of IPSec SA (Security Association). IKE(Internet Key Exchange)协议是IPSec(IP Security)协议簇的重要协议之一,负责动态协商和管理IPSec SA(Security Association,安全关联)。
- An error occured while freeing system memory. Restart IP Security Monitor. 释放系统内存时,出现了一个错误。请重新启动IP安全监视器。
- The IP Security monitor snap-in is used to monitor the IP Security status. IP安全监视器管理单元被用来监视IP安全状态。
- It can implement some security protocol -such as IPSec, PPTP, SSL, IKE. 它可以代替软件来实现一些安全通讯协议,如IPSec,PPTP,SSL,IKE等等。
- On the Networking tab, you can change the type of secure protocol. 在网络选项卡上,您可以更改安全协议的类型。
- What type of security should this IP Security policy specify for communicating with anyone? 此IP安全策略指定什么类型的安全来和任何人通讯?
- A pre-shared key is used to guarantee you are who you say you are in an IP Security (IPSec) communication cycle. 预共享密钥用于保证您在IP安全设置(IPSec)通信周期中所表明的身份。
- This is part of our security protocol to avoid Double claiming or unscrupulous acts by participants Of this program. 这些是我们安全条例的一部分,防止参与者重复领奖或无理行为。
- A mechanism of IP security based on CPK and ECC is introduced.At last, the mechanism is simulated by OPNET. 文章介绍了一种基于组合密钥技术的IP安全机制,并用OPNET进行了仿真试验。
- The passcode is 1234?! Passcodes like that are in direct violation of Code 12 of the UAC Security Protocol Handbook! 密码是1234?像这样的密码简直就是直接违反UAC安全议定手册上的第12号法规嘛!
- Guttman, the other is Athena which is a new efficient automated approach for security protocol proposed by D. Song. 其二是Song在串空间模型上提出的Athena方法。
- Which wireless security protocol cannot use digital certificates for both the supplicant and authentication server? 下列哪个无线网路安全协定无法在用户端与验证伺服器上使用数位凭证??
- Rules govern how and when IP security is used. A rule contains a list of IP filters and specifies the security actions that will take place upon a filter match. 规则控制着何时及怎样使用IP安全检查。规则包含IP筛选器列表并指明当筛选器匹配时使用哪个安全检查。
- The Kerberos authentication protocol is a security protocol that verifies data to help ensure that both user and network services are safe. Kerberos身份验证协议是一种安全协议,用于验证数据以帮助确保用户和网络服务均是安全的。
- Using JXTA Security protocol to protect information security of the system offers the system a good safety, reliability and robustness. 应用JXTA的安全协议保障系统信息安全,使该系统具有良好的安全性、可靠性及鲁棒性。