期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
基于通信顺序进程的计算机网络通信协议形式化描述 被引量:1
1
作者 刘芳 《信息系统工程》 2016年第2期124-124,共1页
在当前的社会中,随着计算机技术、网络技术的不断发展,在人们的日常生活当中,对计算机网络的使用要求越来越高。在这样的情况之下,对于计算机网络通信协议的形式化描述越来越重要。在这一过程中,将通信顺序进程引入到可终止进程当中,同... 在当前的社会中,随着计算机技术、网络技术的不断发展,在人们的日常生活当中,对计算机网络的使用要求越来越高。在这样的情况之下,对于计算机网络通信协议的形式化描述越来越重要。在这一过程中,将通信顺序进程引入到可终止进程当中,同时给出了相应的判定方法。由于过去通信顺序进程只能对同步通信进行描述,因而提出了基于通信顺序进程的异步通信描述方法,最后结合AB协议,进行了基于通信顺序进程的描述。 展开更多
关键词 通信顺序进程 计算机网络通信协议 形式化描述
在线阅读 下载PDF
关于计算机网络通信协议安全性与系统验证的分析 被引量:1
2
作者 任伟嘉 《电子测试》 2022年第22期134-136,共3页
本文将在理清计算机网络通信协议的相关概念与特点的基础上,阐述计算机网络协议安全威胁与通信安全基础,基于IPv6协议详细分析计算机网络安全性,以及计算机网络通信协议验证技术的实践应用。
关键词 计算机网络通信协议 安全性 系统验证技术
在线阅读 下载PDF
浅析计算机网络通信协议
3
作者 聂犇 《才智》 2013年第33期273-273,共1页
计算机网络通信协议是互联网络数据传输中不可或缺的一部分。本文在简单介绍网络通信协议的定义和组成的基础上,详细阐述了TCP\IP协议、SNMP协议以及PPP协议的工作原理和工作方式,从而对于互联网络不同通信层的数据通信进行探讨和研究。
关键词 计算机网络通信协议 TCP\IP协议 SNMP协议 PPP协议
原文传递
A Kind of Multi-party Non-repudiation Protocol with Consistent Evidence
4
作者 Liu Dongmei Qing Sihan 《China Communications》 SCIE CSCD 2009年第4期88-96,共9页
With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiatio... With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack. 展开更多
关键词 multi-party fair non-repudiation protocol consistent evidence collusion attack freehess FAIRNESS
在线阅读 下载PDF
Exploring Application Layer Protocol Relationships in SoftSwitch
5
作者 Zhu Xiaomin Liao Jianxin +1 位作者 Chen Junliang Li Tonghong 《China Communications》 SCIE CSCD 2009年第4期155-167,共13页
Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid mu... Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid much attention to before.On the basis of a well known protocol relationship named protocol conversion, three novel protocol relationships including protocol collaboration relationship, protocol cooperation relationship and protocol independent relationship are presented, so that protocol relationships are classified into four types.According to the functionality and purpose of each protocol, main protocols related to softswitch are divided into five groups.As to protocol conversion in softswitch, information flow trail(IFT) is utilized to facilitate problem solving.A decision rule for protocol conversion mode is proposed to guide how to choose between direct conversion and indirect conversion.A property of protocol relationships in softswitch is induced from all kinds of service scenarios of softswitch.This property summarizes protocol relationships within each protocol group or between two specific protocol groups.A merit of protocol grouping together with classification of protocol relationship is also presented.The effort of this paper pushes the protocol engineering to go ahead. 展开更多
关键词 protocol relationship protocol grouping SOFTSWITCH information flow trail
在线阅读 下载PDF
Seamless Handover for IMS over Mobile-IPv6 Using Context Transfer
6
作者 Reza Farahbakhsh Naser Movahhedinia 《China Communications》 SCIE CSCD 2009年第3期122-133,共12页
Mobility support for the next generation IPv6 networks has been one of the recent research issues due to the growing demand for wireless services over internet.In the other hand,3GPP has introduced IP Multimedia Subsy... Mobility support for the next generation IPv6 networks has been one of the recent research issues due to the growing demand for wireless services over internet.In the other hand,3GPP has introduced IP Multimedia Subsystem as the next generation IP based infrastructure for wireless and wired multimedia services.In this paper we present two context transfer mechanisms based on predictive and reactive schemes,to support seamless handover in IMS over Mobile IPv6.Those schemes reduce handover latency by transferring appropriate session information between the old and the new access networks.Moreover,we present two methods for QoS parameters negotiations to preserve service quality along the mobile user movement path.The performances of the proposed mechanisms are evaluated by simulations. 展开更多
关键词 context transfer seamless handover IP Multimedia Subsystem (IMS) mobile IPv6 Quality of Service (QoS)
在线阅读 下载PDF
Research on the Network Intrusion Detection System based on Modified Particle Swarm Optimization Algorithm
7
作者 XuesongWang Guangzhan Feng 《International Journal of Technology Management》 2016年第1期56-58,共3页
In this paper, we conduct research on the network intrusion detection system based on the modified particle swarm optimization algorithm. Computer interconnection ability put forward the higher requirements for the sy... In this paper, we conduct research on the network intrusion detection system based on the modified particle swarm optimization algorithm. Computer interconnection ability put forward the higher requirements for the system reliability design, the need to ensure that the system can support various communication protocols to guarantee the reliability and security of the network. At the same time also require network system, the server or products have strong ability of fault tolerance and redundancy, better meet the needs of users, to ensure the safety of the information data and the good operation of the network system. For this target, we propose the novel paradigm for the enhancement of the modern computer network that is innovative. 展开更多
关键词 Intrusion Detection NETWORK Particle Swarm Optimization MODIFICATION Algorithm.
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部