【摘 要】
:
On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication betw
【机 构】
:
Computer Institute
论文部分内容阅读
On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in this paper.Meanwhile, the firewall-penetrated evaluating model and its formalized statement is also proposed by quantizing penetrated level, penetrated quality, and penetrated hiding. Finally, the firewall-penetrated technology based on trusted host is analyzed under the firewall-penetrated evaluating model, and the experimental results show that this technology has obvious penetrating effect and high penetrating quality.
其他文献
目的:研究清暑解表方对流感病毒FM1感染小鼠血清IL-6及IFN-γ的影响.方法:建立流感病毒FM1小鼠感染模型,清暑解表方高、中、低剂量分别给药,以利巴韦林为对照,用ELISA法检测
在本文中,我们提出了一种基于Chamfer3-4距离变换和Powell优化的方法,用于X射线图像和CT图像间的配准.该方法首先从X射线图像中分割出目标物体.通过使用投影模型和优化方法,
Shot cokes are frequently formed in the delayed coking unit treating the super viscous oil at PetroChina's Liaohe Petrochemical Company. Considerable work has b
Aim of this research is to minimize makespan in the flexible job shop environment by the use of genetic algorithms and scheduling rules.Software is developed us
Tensile testing results of spray cast Ni3Al-based superalloy indicated that the yield strength and tensile strength increase with the increasing of temperature
Microstructures and mechanical properties of transient liquid phase (TLP) bonded magnesium metal matrix composite (MMC) joints using copper interlayer have been
Based on a non-repudiation protocol NRPUM, which provides point-to-point non-repudiation services, this paper proposes a non-repudiation solution to secure emai
When applied to mobile computing systems, checkpoint protocols for distributed computing systems would face many new challenges, such as low wireless bandwidth,
This article proposes a dynamic subcarrier and power allocation algorithm for multicell orthogonal frequency division multiple access (OFDMA) downlink system, b