Design of voting algorithms and synchronous scheme of intrusion tolerance database;
入侵容忍数据库的选举算法和同步方案设计
Solution of security database based on multi-layer intrusion tolerance;
基于多级入侵容忍的数据库安全解决方案
Digital Signature Based on Elliptic Curve Cryptography and Its Application in Intrusion Tolerance CA;
基于ECC的数字签名及其在入侵容忍CA中的研究
Secure intrusion tolerance scheme based on proactive secret sharing;
基于主动秘密共享的安全容忍入侵方案
Research of intrusion tolerance middleware model based on interceptor;
基于拦截器的容忍入侵中间件模型研究
Design of intrusion tolerance application server based on voting algorithm;
基于大数表决机制的容忍入侵应用服务器设计
An intrusion tolerant KDC scheme for multicast communication;
一种入侵容忍的广播通讯KDC方案
Research of Realization Approach for Intrusion Tolerant System Based on Combined Strategy;
基于组合策略的入侵容忍系统实现方法研究
In this paper an intrusion tolerant CA system was presented.
提出了一个入侵容忍CA(Certificate Authority,认证中心)系统,在此系统中构造了一个基于椭圆曲线密码体制的(t,n)门限签密方案,该方案是数字签名和公钥加密的有机集成,不仅减少了系统的开销,并使得系统能探测故障服务器和克服签密合成者的欺骗。
Authentication System with Intrusion-tolerant Feature;
具有入侵容忍特性的身份认证系统
Threshold Password-enabled Based on Distribute Intrusion-Tolerant Protect Private Key;
基于门限加密技术的全分布入侵容忍私钥保护
The Research and Implementation on Threshold Password-Enabled Based of Intrusion-Tolerant Protect Private Key;
基于门限加密技术的入侵容忍私钥保护应用研究
Research and Implementation of the Intrusion Detector for Intrusion Tolerant Databases;
入侵容忍数据库入侵检测器的研究与实现
Security Analysis of Intrusition Tolerance System Based on Petri Nets;
基于Petri网的入侵容忍系统的性能评价
Research and Design of Web Server Intrusion-Tolerant System;
Web服务器入侵容忍系统的研究和设计
Research on the Theory and Applied Technology of Network Intrusion Tolerance
网络入侵容忍的理论及应用技术研究
Intrusion-tolerant key distribution scheme based on RSA
基于RSA的入侵容忍密钥分发方案
A Survey of Security Quantitative Analysis for Intrusion Tolerant System
入侵容忍系统的安全性量化方法分析
Architecture for Database Security Based of Intrusion-tolerance
基于入侵容忍的数据库安全体系结构
Model Design of Intrusion Tolerant System Based on Byzantine Protocol
基于拜占庭协议的入侵容忍系统模型设计
Threshold Password-enabled Based on Distribute Intrusion-Tolerant Protect Private Key
基于门限加密技术的全分布入侵容忍私钥保护
Algorithms of Sequence Analysis and Theirs Applications in Intrusion Tolerance;
序列分析算法及其在入侵容忍中的应用研究
Digital Signature Based on Elliptic Curve Cryptography and Its Application in Intrusion Tolerance CA;
基于ECC的数字签名及其在入侵容忍CA中的研究
Application Research of the Intrusion Tolerance System Based on Biological Immune Theory;
免疫原理在入侵容忍系统中的应用研究
Research and Implementation of PKI Trust Model and Certificate Authority Based on Intrusion Tolerance;
PKI信任模型及入侵容忍CA的研究与实现
The Research of an Intrusion Tolerant System Based on Code Access Control;
基于代码安全控制的入侵容忍系统的研究
Research on the Model of Intrusion Tolerance System and the CA Scheme Based on Threshold;
入侵容忍系统模型及基于门限的CA方案研究
The Research of Database Security Based on Intrusion Tolerance Technique;
基于入侵容忍技术的数据库安全的研究
Research of Realization Approach for Intrusion Tolerant System Based on Combined Strategy;
基于组合策略的入侵容忍系统实现方法研究
Study and Implement on Intrusion Tolerant Techniques Based on Process Migration;
基于进程迁移的入侵容忍技术的研究与实现
CopyRight © 2020-2024 优校网[www.youxiaow.com]版权所有 All Rights Reserved. ICP备案号:浙ICP备2024058711号