Description: Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanced network concepts, such as moving networks and mobile ad hoc networks. HIP is \"cool\", which means that as a mobile VPN solution, when your network interfaces go up or down, there is no need to re-establish a secure tunnel. Platform: |
Size: 2965982 |
Author:nihao |
Hits:
Description: HIP:Host Identity Protocol,主机识别协议,这个HIPL则是linux下的HIP源码。HIp为网络提供更好的安全,更高的隐私需求,也更好的支持了多播,移动性-HIP: Host Identity Protocol, host recognition agreement, the HIPL is linux-source under the HIP. HIp for the network to provide better security, higher demand for privacy, but also better support multicast, mobility Platform: |
Size: 3357696 |
Author:maybemay |
Hits:
Description: Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanced network concepts, such as moving networks and mobile ad hoc networks. HIP is "cool", which means that as a mobile VPN solution, when your network interfaces go up or down, there is no need to re-establish a secure tunnel. Platform: |
Size: 2965504 |
Author:nihao |
Hits:
Description: Android与IIS身份验证案例源码,在Android移动项目开发中,访问服务器时,为了简洁方便,我们经常使用http协议来传递JSON格式的数据。然而有些项目需要有一定的安全性,如使用Android客户端登陆到MIS系统。虽然我们是通过Android手机客户端的登陆Activity中登陆到系统的,但是略懂电脑的黑客是能够跳过登陆Activity,从而直接进入系统的。这样,会造成一些由于系统的不安全所带来的麻烦。建立一种防止黑客强行登录的身份验证模式尤为重要。此时,系统的身份验证成为阻挡黑客登陆的一道屏障。那么,怎样实现一个身份验证呢?让我们以IIS为宿主,一步一步的实现身份验证吧-Android and IIS authentication case source code, in the Android mobile project development, access to the server, in order to be simple and convenient, we often use the HTTP protocol to transfer JSON format data. However, some of the project needs to have a certain security, such as the use of Android client login to the MIS system. Although we are through the Android mobile client landing Activity landing to the system, but slightly understand the computer hacker is able to skip the landing Activity, thus directly into the system. In this way, it will cause some of the problems caused by the system is not safe. It is particularly important to establish an identity authentication mode to prevent hackers logging in. At this point, the identity of the system has become a barrier to prevent hackers landing. So, how to achieve an identity verification? Let us take IIS as the host, step by step to achieve authentication bar Platform: |
Size: 1078272 |
Author:邢丽 |
Hits: