Computer Science ›› 2006, Vol. 33 ›› Issue (11): 56-60.
Previous Articles Next Articles
Online:
Published:
Abstract: The weakness in design of software and hardware architecture, and without strict authentication and authorization to users, which are the main cause of security incidents. The traditional security safeguards focus in server and network protection, but ign
Key words: Network trusted connection,OSAP protocol, Common criterion
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I11/56
Cited