Welcome![Sign In][Sign Up]
Location:
Search - negotiation

Search list

[File Operateipsec vpn相关rfc集

Description: IPsec VPN的RFC文档集合: RFC 2401 《Security Architecture for the Internet Protocol》 RFC 2402 《IP Authentication Header》 RFC 2406 《IP Encapsulating Security Payload (ESP)》 RFC 2407 《The Internet IP Security Domain of Interpretation for ISAKMP》 RFC 2408 《Internet Security Association and Key Management Protocol (ISAKMP)》 RFC 2409 《The Internet Key Exchange (IKE)》 RFC 3947 《Negotiation of NAT-Traversal in the IKE》 RFC 3948 《UDP Encapsulation of IPsec ESP Packets》 -IPsec VPN RFC documentation set : RFC 2401, "Security Architecture for the Internet Protocol" RFC 2402 "IP Authentication Header" RFC 2406, "IP VPN Security PayloadPlus (ESP)," RFC 2407, "The Internet IP Security Domain of Interpretation for ISAKMP" RFC 2408 "Internet Security Association and Key Management Protocol (ISAKMP)," RFC 2409, "The Internet Key Exchange (IKE)," RFC 3947 "Negotiation of NAT-Traversal in the IKE" RFC 3948 "UDP Encapsulation of IPsec ESP Packets"
Platform: | Size: 174094 | Author: 水易清 | Hits:

[Streaming Mpeg4directshowBall

Description: Video source filter that produces an image of a bouncing ball. This sample illustrates format negotiation and the use of the source filter base classes CSource and CSourceStream. -Video source filter that produces an image of a bouncing ball. This sample illustrates for mat negotiation and the use of the source filter CSource base classes and CSourceStream.
Platform: | Size: 16710 | Author: zcs | Hits:

[CommunicationSDP_Offer_Answer_Examples

Description: This gives examples of Session Description Protocol (SDP) offer/answer exchanges. Examples include codec negotiation and selection, hold and resume, and addition and deletion of media streams. The examples show multiple media types, bidirectional, unidirectional, inactive streams, and dynamic payload types. Common Third Party Call Control (3pcc) examples are also given.
Platform: | Size: 6104 | Author: kennyqiu | Hits:

[DirextXdirectshow_Ball

Description: directshow的一个例子。 This sample illustrates format negotiation and the use of the source filter base classes CSource and CSourceStream.
Platform: | Size: 35979 | Author: xw | Hits:

[File Formatipsec vpn相关rfc集

Description: IPsec VPN的RFC文档集合: RFC 2401 《Security Architecture for the Internet Protocol》 RFC 2402 《IP Authentication Header》 RFC 2406 《IP Encapsulating Security Payload (ESP)》 RFC 2407 《The Internet IP Security Domain of Interpretation for ISAKMP》 RFC 2408 《Internet Security Association and Key Management Protocol (ISAKMP)》 RFC 2409 《The Internet Key Exchange (IKE)》 RFC 3947 《Negotiation of NAT-Traversal in the IKE》 RFC 3948 《UDP Encapsulation of IPsec ESP Packets》 -IPsec VPN RFC documentation set : RFC 2401, "Security Architecture for the Internet Protocol" RFC 2402 "IP Authentication Header" RFC 2406, "IP VPN Security PayloadPlus (ESP)," RFC 2407, "The Internet IP Security Domain of Interpretation for ISAKMP" RFC 2408 "Internet Security Association and Key Management Protocol (ISAKMP)," RFC 2409, "The Internet Key Exchange (IKE)," RFC 3947 "Negotiation of NAT-Traversal in the IKE" RFC 3948 "UDP Encapsulation of IPsec ESP Packets"
Platform: | Size: 174080 | Author: 水易清 | Hits:

[Streaming Mpeg4directshowBall

Description: Video source filter that produces an image of a bouncing ball. This sample illustrates format negotiation and the use of the source filter base classes CSource and CSourceStream. -Video source filter that produces an image of a bouncing ball. This sample illustrates for mat negotiation and the use of the source filter CSource base classes and CSourceStream.
Platform: | Size: 16384 | Author: zcs | Hits:

[Program docSDP_Offer_Answer_Examples

Description: This gives examples of Session Description Protocol (SDP) offer/answer exchanges. Examples include codec negotiation and selection, hold and resume, and addition and deletion of media streams. The examples show multiple media types, bidirectional, unidirectional, inactive streams, and dynamic payload types. Common Third Party Call Control (3pcc) examples are also given.
Platform: | Size: 6144 | Author: kennyqiu | Hits:

[DirextXdirectshow_Ball

Description: directshow的一个例子。 This sample illustrates format negotiation and the use of the source filter base classes CSource and CSourceStream. -An example of DirectShow. This sample illustrates format negotiation and the use of the source filter base classes CSource and CSourceStream.
Platform: | Size: 35840 | Author: xw | Hits:

[Documentsppp

Description: ppp上网的报文分析,包括LCP协商阶段,CHAP验证阶段,IPCP协商阶段。-上网ppp packet analysis, including the LCP negotiation phase, CHAP authentication phase, IPCP negotiation phase.
Platform: | Size: 12288 | Author: 发发的 | Hits:

[Windows DevelopModernBusinessNegotiation

Description: 人们之间要相互交往、改善关系、协商问题,就要进行谈判.企业销售产品、购买材料、职工调动工作、政府的外交联系、国家间的和平协定,甚至是家庭纠纷等,都可以成为谈判的内容.谈判的进程、谈判内容的商榷要围绕着事先拟定的谈判日程进展。如何把谈判的议程与谈判主题、谈判要点紧密结合起来。-Interaction between people to improve their relationship, consultation questions, it is necessary to negotiate. Enterprises sell their products, purchase materials, trade union mobilization efforts, the Government s diplomatic ties, the peace agreement between the country and even family disputes and so on, could become a bargaining content. the negotiation process, open to question elements of the negotiations prior to revolve around the schedule drawn up by the progress of negotiations. How to put the agenda of negotiations with the subject of negotiations, the negotiations closely combine the elements.
Platform: | Size: 16384 | Author: 俞巍芳 | Hits:

[Windows Developwangluoshudian

Description: 随着中国加入WTO,全球经济一体化的逐步深入,网上书店已是现代传统书店必不可少的经营策略。目前,网上书店在国际互联网上可以实现的商务功能已经多样化,可以说从最基本的对外沟通展示功能、信息发布功能,在线图书展示功能、在线洽谈功能、在线交易功能、在线采购功能、在线客户服务功能、在线网站管理功能等等,几乎以往传统书店功能都可以在互联网上进行电子化的高效运作。 技术的进步对传统书店上网解决方案提出更严格的要求和挑战。为了保护传统书店的投资,书店上网解决方案应切合传统书店实际的需求和发展的趋向,使投入回报和管理效益最大化,传统书店在实施上网方案的之前,必须对一系列问题进行科学的论证,如网上书店的需求分析、网上书店总体规划、网上书店系统的功能和实施方案、网上书店的传播与推广、运行网上书店系统的软件和硬件配置、网上书店的管理系统和管理方法等等。网上书店具体实施的质素直接影响传统书店在Internet的实际效果和经济效益,这不仅是技术问题,同时也涉及到管理的因素。 综上所述,网上书店已经成为互联网时代传统书店的必由之路。-With China s accession to the WTO, the world s gradual deepening of economic integration, on-line bookstore is essential to modern traditional bookstore business strategy. At present, the online bookstore on the Internet can be achieved has been the diversification of the business functions, it can be said from the most basic display of the external communication function, information publishing, online book display features, online negotiation capabilities, online transaction capabilities, on-line purchasing function, online customer service features, on-line site management functions, etc., almost traditional bookstore functions can be carried out on the Internet, the efficient operation of the ESD. Technological advances of traditional online bookstore solutions for more stringent requirements and challenges. In order to protect the investment in traditional bookstores, online bookstore solution should meet the actual needs of traditional bookstores and development trends, so that
Platform: | Size: 1722368 | Author: 王平战 | Hits:

[Other Web CodeAjaxChartRoom

Description: javascript实现的一个实时在线谈判模块,非常实用-javascript to achieve a real-time online negotiation module, very useful
Platform: | Size: 50176 | Author: chenshangan | Hits:

[BooksWSNsnetwork

Description: 无线传感器网络安全路由协议的设计与分析 路由安全是无线传感器网络安全的关键因素,而现有的无线传感器网络路由协议在设计时都没有充分考虑安全问 题。在充分考虑网络路由协议攻击方法和无线传感器网络自身特点的基础上,结合基于ID的认证密钥协商技术以及秘密共 享技术,提出了无线传感器网络路由的安全策略及其设计思想。同时,在路由建立阶段增加安全机制,提出了一种较优的安 全路由协议。经过安全性分析,该路由协议可防御虚假路由信息、Sybile、确认欺骗等常见攻击。 -:Theroutesecurityisthekeyfactorofthesecurityofwirelesssensornetworks.However,when designed,noneoftheexistingroutingprotocolshasmadesufficientconsiderationonsecurityissues.Based ontheenoughconsiderationontheattackmethodsfornetworkroutingprotocolsandthecharacteristicsof wirelesssensornetworks,thesecuritystrategyandthedesignmethodofthenetworkroutingprotoco1are elaborated,in which theID-based authentication and key negotiation technologyand the secretsharing technologyareadopted.Atthesametime,thesecurity mechanism isadded totherouting establishment processandthenanoptimalsecurityroutingprotocolisproposed.Analysesshow thatthisprotocolcanbe usedtodefendfamiliarattackssuch asspoofedrouting information,theSybileattack,andacknowledge— mentspoofing.
Platform: | Size: 252928 | Author: 池尚琨 | Hits:

[Windows Developtest

Description: 一个基于信任协商的开源聊天软件,软件中分别包含客户端和服务器端,通过两者互相交换证书,从而建立信任关系可以聊天-a software based on trust negotiation
Platform: | Size: 81920 | Author: 刘思 | Hits:

[JSP/JavaBarginalModel

Description: 讨价还价模型 用于各种商务谈判规则的制定以及策略选取-Bargaining model is applied to a variety of business negotiation rule-making and strategy selection
Platform: | Size: 2048 | Author: aking | Hits:

[Software EngineeringPPP-protocol-negotiation-process

Description: PPP协议协商过程,这个是GPRS在拨号之后的协议协商过程。很有参考价值!!个人制作-PPP protocol negotiation process, this is a GPRS dial-up protocols after the consultation process. Of great reference value! ! Personal Production
Platform: | Size: 570368 | Author: lsccls | Hits:

[JSP/JavaTrustBuilder_v-3_1

Description: 帮助陌生人之间建立信任关系的信任协商工具!-Distributed software subjects face the problem of determining one another’s trustworthiness. The problem considered is managing the exchange of credentials between strangers for the purpose of property-based authentication and authorization when credentials are sensitive. An architecture for trust negotiation between client and server is presented. The notion of a trust negotiation strategy is introduced and examined with respect to an abstract model of trust negotiation. Two strategies with very different properties are defined and analyzed.
Platform: | Size: 1258496 | Author: royn | Hits:

[Software EngineeringA-Price--and-Time-Slot-Negotiation-Mechanism-for.

Description: A Price- and-Time-Slot-Negotiation Mechanism for
Platform: | Size: 1603584 | Author: JP | Hits:

[Crack Hacknegotiation-security-research

Description: 随着计算机技术的飞速发展,网络无时不刻在改变人们的生活方式和工作方式,网络化已经成为当今社会发展的一个重要特征。随之而来的网络信息安全,也成为了全球的热点问题。如果一个国家不能保证网络信息的安全,就不能保证社会经济生活等各种活动的有序进行。网上谈判属于电子商务活动,在网上谈判中需要建立一个安全、便捷的电子商务应用环境,PKI对于保证网络谈判过程中的信息安全性有一定意义。 本文主要研究网上谈判中信息安全保障问题。首先对网上谈判的原理、过程和发展趋势进行了一个全面论述。然后根据信息安全现状及存在问题,阐述了PKI、防火墙和IDS等安全保障机制,重点研究PKI,并且对PKI的应用和发展作了更深一步的论述。接着以江阴焱鑫科技有限公司为例,研究其网络拓扑结构,对其网上谈判的安全隐患进行分析,主要以黑客攻击的形式体现,针对这些问题利用PKI来实施部署,保障网上谈判中的信息安全,最后总结部署后系统的安全性能。 -Along with the rapid development of computer technology, network which has become an important feature of current social development , is changing people s lifestyle and working style all the time. The consequent network information security has also become a hot spot in a global area. If a country can not guarantee the security of network information, it will not be able to ensure the orderly conduct of the social and economic life and other activities. Online negotiations belong to the e-commerce activities, and it is necessary to establish a safe and convenient e-commerce application environment. PKI for the network to ensure the information security in the negotiation process has certain significance. This paper mainly studies the information security issues during online negotiations. First of all, we make a comprehensive exposition of the principles, processes and development trends of the online negotiations. Then according to the information security status and existed problem
Platform: | Size: 2801664 | Author: 刘平 | Hits:

[WEB CodeE-price_negotiation

Description: online shopping price negotiation
Platform: | Size: 2882560 | Author: jose247 | Hits:
« 12 3 4 »

CodeBus www.codebus.net