搜索资源列表
可信网络连接关键技术研究与实现
- With the accelerate implementation of information and the rapid development of e-commerce and e-government, the network security is of great significance. Now people are more concerned about how to ensure working at a trusted network environment. In
NIST_Recommendation_for_X509_PVMs.pdf
- A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or
A-Taxonomy-and-Adversarial-Model-for
- In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have been put forth to sanitize this sensitive data source in order to
Web-front-end-hacking-techniques
- Web 前端的黑客攻防技术是一门非常新颖且有趣的黑客技术,主要包含Web 前端安全的跨站脚本 (XSS)、跨站请求伪造(CSRF)、界面操作劫持这三大类,涉及的知识点涵盖信任与信任关系、Cookie 安全、Flash 安全、DOM 渲染、字符集、跨域、原生态攻击、高级钓鱼、蠕虫思想等,这些都是研究前端 安全的人必备的知识点。本书作者深入剖析了许多经典的攻防技巧,并给出了许多独到的安全见解。-Web front-end hacker attack and defense is a ve
adhoc-security
- 提出了一种基于信任模型的机会路由协议,有效地保证了自组网网路的安全正常通信。弥补了机会路由协议中的安全隐患问题-This paper proposes a trust model based routing protocols, effectively guarantee the safety of AD hoc network normal communication.To make up for the safety problems in routing protocol opportun
1111.3165
- Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different