• 沒有找到結果。

[PDF] Top 20 A Secure PC-Based Architecture for Remote Server Management

Has 10000 "A Secure PC-Based Architecture for Remote Server Management" found on our website. Below are the top 20 most common "A Secure PC-Based Architecture for Remote Server Management".

A Secure PC-Based Architecture for Remote Server Management

A Secure PC-Based Architecture for Remote Server Management

... 對於 PC-Based 的防火牆,由於許多的伺服器 將會連接到他的後面,同時也執行即時的 Netflow 輸出動作,其系統的負載將比較重。因此,我們以 性能較佳的 Intel Xeon 伺服器來架設,而其上的防 火牆系統,則是用 Packet Filter [6]來實作。序列埠 主控台管理系統,由於不需要大量的運算與強大的 網路功能,因此我們可以用一部 Intel P-III 等級的 PC ... See full document

5

An Internet Based Communication Server for Remote Control

An Internet Based Communication Server for Remote Control

... system architecture of the communication server is shown as in Figure ...4. A tty driver is developed for the communication server ...communication server, in order to aware ... See full document

6

Security Analysis of a Remote User Authentication Scheme Using Euclidean Plane for Multi-Server Architecture

Security Analysis of a Remote User Authentication Scheme Using Euclidean Plane for Multi-Server Architecture

... designed for the single-server ...each server individually and possibly should remember different identities and passwords for accessing dif- ferent ...scribed a verifier-free password ... See full document

6

A distributed server architecture supporting dynamic resource provisioning for BPM-oriented workflow management systems

A distributed server architecture supporting dynamic resource provisioning for BPM-oriented workflow management systems

... presents a distributed server architecture for BPM- oriented workflow management ...workflow management systems work based on simple cli- ent-server ... See full document

15

Time-bound Based Authentication Scheme for Multi-server Architecture

Time-bound Based Authentication Scheme for Multi-server Architecture

... schemes are designed for single-server environments, users who access different remote servers need to register many times and passwords. To solve this problem, we propose a more effic[r] ... See full document

1

A secure WDM ring access network employing silicon micro-ring based remote node

A secure WDM ring access network employing silicon micro-ring based remote node

... . For the condition of more RNs, the wavelength sharing mech- anism was ...wavelengths for wavelength hopping of a specific ...wavelength management involves higher level protocol; hence it was ... See full document

5

A Web-based monitor and management system architecture for enterprise virtual private network

A Web-based monitor and management system architecture for enterprise virtual private network

... detection for the status of the main ...(2) Management report setting function: the network topology or abnormity report could be acti- vated according to the settings demanded by the network ...policy ... See full document

22

Provably Secure ID-based Mutual Authentication and Key Agreement for Multi-server Environment

Provably Secure ID-based Mutual Authentication and Key Agreement for Multi-server Environment

... However, a traditional remote user authentication is only suitable for the single server architecture ...tional remote user authentication may suffer from several attacks if it ... See full document

12

An ID-based remote user authentication scheme without using smart cards for multi-server environment

An ID-based remote user authentication scheme without using smart cards for multi-server environment

... of remote user authentication scheme using smart cards for multi-server environment has been received much attention ...ID-based remote user authentication scheme without using smart ... See full document

10

SIP-based VoIP-over-MPLS Architecture Design and System Development for Interactive and Secure Multimedia Services

SIP-based VoIP-over-MPLS Architecture Design and System Development for Interactive and Secure Multimedia Services

... when a caller wants to initiate one session with the callee over the SIP-based MPLS network, the caller will send an INITVE request to the local SIP proxy to get the SIP server ...in a ... See full document

6

Cryptanalysis of Hsiang-Shih’s Secure Dynamic ID Based Remote User Authentication Scheme

Cryptanalysis of Hsiang-Shih’s Secure Dynamic ID Based Remote User Authentication Scheme

... proposed a secure dynamic ID based remote user authentication scheme for multi-server ...using secure dynamic ID instead of static ...and server impersonation ... See full document

4

A Smart Card Based Authentication Scheme for Remote User Login and Verification

A Smart Card Based Authentication Scheme for Remote User Login and Verification

... two remote user authentication schemes using smart ...which a legal user can negotiate a specific session key with his remote authentication server by executing mutual ...room ... See full document

23

A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce

A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce

... requirements, a comparison of the Asokan et ...describe a server-aided signature scheme based on secret sharing for mobile ...commerce. A mobile user gets an application’s ... See full document

10

A Secure Authentication System for Distributed Computing Environment Based on PKI Biometric Verification and Kerberos

A Secure Authentication System for Distributed Computing Environment Based on PKI Biometric Verification and Kerberos

... password based architecture, purely symmetric cryptography, and the assumption that client can securely protect users’ verification ...propose a secure authentication system based on ... See full document

8

A Web-based CBR knowledge management system for PC troubleshooting

A Web-based CBR knowledge management system for PC troubleshooting

... – A case library: case knowledge stored in the case library includes case attribute indices, a declarative vocabulary and problem solution ...plays a role in those ...formats for sharing and ... See full document

9

A New Remote User Authentication Scheme based on Bilinear Pairings for Multi-server Environment

A New Remote User Authentication Scheme based on Bilinear Pairings for Multi-server Environment

... Key words: multi-server, bilinear pairing, elliptic curve, key distribution center 摘要 雙線性配對在密碼學上的特性已經做了許多學術 研究。最近 Das 等人利用橢圓曲線的雙線性配對 提出了一篇新的遠端身分驗證方案,但是該方案 並不適用在多伺服器的環境中。在本篇文章我們 提出利用雙線性配對特性對多伺服器環境提出一 ... See full document

9

An Efficient and Secure Group Key Management for IEEE 802.16j Architecture

An Efficient and Secure Group Key Management for IEEE 802.16j Architecture

... and a set of RS within the same security ...to a RS after the RS got authenticated during initial network entry [6] ...RSs. For example, the compromised RSs can replay the relayed messages to ... See full document

8

A Secure Mobile Electronic Payment Architecture Platform for Wireless Mobile Networks

A Secure Mobile Electronic Payment Architecture Platform for Wireless Mobile Networks

... of a wireless mobile network have been achieved, customers are then more interested in value-added mobile ...applications, a solid, secure and robust trading model is a ...such a ... See full document

9

A software architecture for GPRS session management

A software architecture for GPRS session management

... presented a modular, compatible, and flexible software framework to implement GPRS SM ...time. Based on the proposed software architecture, we have described the behaviour of the SGSN in the PDP ... See full document

17

Porting PC-based Network Game to Mobile Devices Through Agent Server

Porting PC-based Network Game to Mobile Devices Through Agent Server

... In this model, game clients are split into mobile code and agent servers, such that agent servers can filter unnecessary messages and make mobile code simpler to fit in [r] ... See full document

11

Show all 10000 documents...