Transport Layer Security

美 [ˈtrænspɔːrt ler sɪˈkjʊrəti]英 [ˈtrænspɔːt ˈleɪə(r) sɪˈkjʊərəti]
  • 网络传输层安全性;传输层安全;传输层安全协议
Transport Layer SecurityTransport Layer Security
  1. The Security Research of the Network Transport Layer Security Protocol SSL

    网络传输层安全协议SSL的安全性研究

  2. Application of Improved Transport Layer Security Protocol in Enhancing Data Communication Security of Wind Farm

    改进传输层安全协议在提高风电场数据通信安全中的应用

  3. Study and implementation of wireless transport layer security of wireless application protocol

    无线应用协议的安全层研究与实现

  4. Method starts transport layer security encryption .

    方法启动传输层安全加密。

  5. Contains settings for Wireless Transport Layer Security .

    包含设置无线传输层安全性。

  6. Defines the transport layer security options to use when opening connections to the directory .

    定义打开与目录的连接时使用的传输层安全性选项。

  7. For instance , requesting the TLS profile ensures that channels are encrypted using Transport Layer Security .

    例如,请求TLS配置文件确保通道使用“传输层安全性(TransportLayerSecurity)”加密。

  8. Transport Layer Security ( TLS ) is a cryptographic protocol that provides secure communication between clients and servers .

    transportlayersecurity(TLS)是一种密码协议,可以在客户机和服务器之间提供安全的通信。

  9. Currently , Transport Layer Security ( TLS ) is the de facto standard for secure communication over the Internet .

    当前,传输层安全性(TransportLayerSecurity(TLS))是因特网上安全通信的事实标准。

  10. In this paper , we firstly describe the application model and architecture of WAP , and analyze the Wireless transport layer security ( WTLS ) specification .

    该文首先描述了WAP的应用模型和体系结构,同时分析了WTLS的技术规范;

  11. For both of these functions we can leverage the Secure Sockets Layer ( SSL ) and Transport Layer Security ( TLS ) protocols .

    我们可以利用安全套接字层(SSL)和传输层安全性(TransportLayerSecurity,TLS)协议实现这两种功能。

  12. Based on the analysis of the current security characteristic in Aglet system , an extension framework is proposed to perfect the Aglet using encryption and Transport Layer Security protocol .

    在简单介绍了其现有安全特性的基础上,提出了混合利用签名认证、加密和传输层安全协议等技术来完善Aglet的安全体系。

  13. Currently , the Secure Socket Layer ( SSL ) and Transport Layer Security ( TLS ) protocols are used to provide transport-level security for Web services .

    目前,安全套接字层(SecureSocketLayer,SSL)协议和传输层安全性(TransportLayerSecurity,TLS)协议被用于为Web服务提供传输层安全性。

  14. Because a MAC can be computed faster than a digital signature , it is practical for transport layer security like SSL , where a large volume of data is transmitted .

    由于MAC的计算要比数字签名快,因此它对于诸如SSL等数据传输量很大的传输层安全性来说是实用的。

  15. Service Levels and running flow of wireless transport layer security are described . WTLS state machine is designed by message event driven , design and implement WTLS of mobile terminal .

    阐述了无线传输安全协议的服务类型、运行流程,采用消息事件机制设计WTLS状态机,并在移动终端上设计且实现了WTLS。

  16. Transport Layer Security ( TLS ) is the standard for security at the transport layer , while at the SOAP message level , WS-Security is the specification of choice .

    传输层安全性(TransportLayerSecurity,TLS)是传输层的安全标准,而在SOAP消息级别,WS-Security是首选的安全规范。

  17. , Such as Secure Sockets Layer ( SSL ) along with the Transport Layer Security ( TLS ) and IPSec , provide the transient , point-to-point security in a single session .

    现有的Web应用安全方案通常是建立在传输层安全之上,采用诸如SSL/TLS,IPSec等技术,在一个会话期间保障数据安全,提供点对点(point-to-point)的安全保护。

  18. In the framework of WAP , the protocol WTLS ( Wireless Transport Layer Security ) which is based on WPKI , is adopted to provide several security services in application level such as authentication , confidentiality and integrity .

    在WAP应用框架中,采用了基于WPKI基础设施的WTLS协议来提供诸如身份认证、保密性、完整性等应用层级的安全服务。

  19. Then we focus on some important protocols which will be used in WPKI , especially the WEP algorithm in IEEE 802.11 and the Wireless Transport Layer Security ( WTLS ) in Wireless Application Protocol ( WAP ) .

    特别是IEEE802.11中的WEP算法和无线应用协议(WAP)中的无线传输层安全协议(WTLS)。

  20. When developing Web services and B2B applications based on SOAP , if just depend on existing transport layer security technology ( for example : SSL ), the security requirement of non-repudiation and end to end transactions can 't be satisfied .

    开发基于SOAP的Web服务和B2B应用时,仪依靠现有的传输层安全机制(如SSL)不能使不可否认性和端到端的安全性要求得到满足。

  21. At present , the main research directions of cognitive radio include spectrum sensing , spectrum analysis , spectrum decision , spectrum sharing , spectrum mobility management , route designing , transport layer protocol , network security problem and so on .

    认知无线电目前的主要研究方向包括频谱感知、频谱分析、频谱决策、频谱共享、频谱移动性管理、路由设计、传输层协议和网络安全问题等。

  22. The transport layer is comparable to Transport Layer Security ( TLS ), and you can employ custom authentication methods to extend the user authentication layer .

    传输层可媲美传输层安全(TransportLayerSecurity,TLS),而且您可以运用定制的身份验证方法来扩展用户认证层。