| 1. | Secure protocols and technology for online payment in electronic commerce 电子商务中在线支付的安全协议和技术 |
| 2. | In your browser , you can tell when you are using a secure protocol , such as tls , in a couple of different ways 在用户的浏览器中用户可以有许多不同的方式知道何时使用了如tls之类的安全协议。 |
| 3. | With windows 2000 server , you can use several new , more secure protocols for creating virtual private networks , including 利用windows2000server ,可以用以下几个新型、更安全的协议创建虚拟专用网络,这些协议是: |
| 4. | At its inception , dns was not designed to be a secure protocol . because of its vulnerability , dns faces many threats from a variety of aspects Dns协议在设计之初就没有考虑太多的安全因素,协议本身所存在的脆弱性使得dns面临着各种威胁。 |
| 5. | Ssl protocol is one of the most famous secure protocols . it belongs to the session layer , and plays an important role in the internet Ssl协议隶属于会话层,处于有连接的会话层( tcp )之上,它一经产生就在internet领域发挥了它的巨大作用。 |
| 6. | Presently , many of the famous commercial products of browsers and web servers support ssl internally . ssl has become the most prevailing www secure protocol 目前,国外著名的商用浏览器和web服务器都内嵌地支持ssl协议, ssl己成为最流行的www安全协议。 |
| 7. | The ssl protocol developed by netscape communications is a famous secure protocol in data transmission process , which is widely applicable in communication security Ssl协议是由netscape公司研究制定的安全数据传输协议,该协议被广泛应用于安全数据传输与互连网交易中。 |
| 8. | Ipsec protocol suite is a general - purpose secure protocol for internet . tightly integrated with ip protocol , it can provide various secure services for traffic at the ip layer Ipsec协议集是一个与ip协议栈紧密结合的通用的安全协议,可以为ip层和ip层以上的数据传输提供统一的安全保障和安全服务。 |
| 9. | Entirely analyzed the secure protocols in www especially to ssl protocol . finished the protocol coherence test etc . it was proved to be viable through the practical testing process 全面分析了www安全协议的现状,重点研究了ssl协议,并对该类产品所采用协议一致性等项目进行测试,在实际测试中证明该方法是可行的。 |
| 10. | The theoretical contributions of this paper are that the author analyzes the bottom layer of the protocol , pointed out the elliptical curve and secondary encryption in rsa based on common used secure protocols 本文的理论贡献是在分析常用的信息技术安全协议的基础上,分析了网络底层的安全协议,提出了椭圆曲线在密钥交换和对rsa进行指数二次加密的解决方案。 |