Computer Science ›› 2006, Vol. 33 ›› Issue (11): 56-60.

Previous Articles     Next Articles

  

  • Online:2018-11-17 Published:2018-11-17

Abstract: The weakness in design of software and hardware architecture, and without strict authentication and authorization to users, which are the main cause of security incidents. The traditional security safeguards focus in server and network protection, but ign

Key words: Network trusted connection,OSAP protocol, Common criterion

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!