Doing so can provide greater security in an insecure public network with heterogeneous systems. 这样做可以在包含各类系统的不安全公共网络中提供更强的安全性。
Kerberos is a third-party network authentication protocol that employs a system of shared secret keys to securely authenticate a user in an insecure network environment. Kerberos是一种第三方网络身份验证协议,它采用一个带共享密钥的系统来对不安全的网络环境中的用户安全地进行身份验证。
While the Internet is inherently insecure, businesses still need to preserve the privacy of data as it travels over the network. 因特网不安全是固有的,而工商界仍需要数据在因特网上传输时保留其隐私性。
If Bob received alice's key over an insecure channel, such as a public network, Bob must verify with Alice that he has a correct copy of her public key. 如果小明在不安全的信道如公共网络上收到小红的密钥,则小明必须同小红验证他具有她的公钥的正确副本。
Concerning the insecure factors of Short Message Service ( SMS) in public mobile network, a SMS system for secure communication was put forward. 针对目前移动公网中短信系统存在的不安全因素,提出了一种安全短消息通信系统。
Since the Internet is not secure, many organizations now begin develop and deploy the Virtual Private Network technology for their secure internal communication on this global, yet insecure network. 由于INTERNET的不安全性,许多的团体和组织为了在这个全球性的开放网络上进行安全的内部通信,开发并采用了虚拟私用网络(VPN)技术。
Any individual, enterprise, commercial organization or bank will not perform transactions through an insecure network, which will leak the commercial secrets or personal privacy and cause serious losses. 任何个人、企业或商业机构及银行都不会通过一个不安全的网络进行商务交易,因为这样会导致商业机密信息或个人隐私的泄露,从而造成巨大的利益损失。
Using public-key algorithms, digital certificates, and other related cryptography technologies, PKI could provide a secure platform for network applications above a insecure network environment. 通过公钥算法、数字证书和相关加密算法,PKI为网络应用提供了一个安全平台。
The work in this thesis is based on the project of national natural science fund of Research on the secure payment protocol for electronic commerce, and focuses on how to implement an off-line electronic cash payment prototype system via the insecure Internet network. 本文的工作是结合国家自然科学基金重大项目电子商务安全支付协议的研究展开的,重点研究如何在不安全的Internet网络上实现一种离线电子现金支付系统的原型系统。
How to realize a secure, efficient and facile payment via the insecure network has attracted more and more attention. 如何在不安全的互联网上实现安全、高效、便捷的支付已引起人们越来越多的关注。
When authenticating real time streams in an insecure network, people are always concerned with two important issues: efficiency and loss resistance. 在不安全的网络上进行实时数据流的认证,认证速度和防止丢包能力是两项关键的指标。
This paper puts forward and implements a CA-IPSec frame VPN so-lution, ant its aim is to creat a secure VPN in the insecure internet, to protect the security of network transmission. 该文提出了CA-IPSec结构的VPN解决方案,其目标是在不安全的Internet网络上建立一个安全的VPN,保证网络传输安全。
How to realize the secure payment in the insecure network environment, has become not only the focus which people keep close watch on, but also an important subject to be devoted deep and thorough research. 如何在不安全的因特网上实现安全的支付,是人们密切关注的焦点,也是一个值得深入研究的课题。
SSH is a protocol for secure remote login and other secure network services over an insecure network. 安全外壳协议是一种在不安全网络上用于安全远程登录和其他安全网络服务的协议。
To eliminate the potential insecure hazard in computer networks for power systems, a project to construct a more secure computer network, which can protect the real-time electric power production system and management networks in different levels from possible outside attacks, is proposed. 针对目前各级电力系统计算机网络中存在的安全隐患,作者提出了一种比较安全的网络构建方案。该方案能有效地保障电力实时生产系统与各级管理网络免受网络攻击。
However, if there are insecure nodes being mingled in the initial stage of positioning, the nearby nodes will easily regard it as neighbor node in the network structure, which will be harmful to the entire wireless sensor networks. 如果在定位的初始阶段有不安全节点混入,容易被周围节点当成自己的邻节点加入到网络中,这将会给整个无线传感器网络带来安全隐患。
Encryption technology implementation are essential to ensure that confidential information, you can make some important data is stored on a computer on unsafe or insecure transmission network environment. 加密技术是实现信息保密的重要保证,可以使一些重要数据存储在一台不安全的计算机上,或者在不安全的网络环境中传递。
However, as the existence of the insecure factors of the network and the limitations of the network communication protocols, it brings the possibility for the invaders to attack the network. 然而,网络本身的不安全因素以及网络通信协议的缺陷,为入侵者的攻击带来了可能。