共查询到20条相似文献,搜索用时 125 毫秒
1.
2.
随着计算机网络日益深入人们的日常生活和工作,人们已经不仅仅局限于独立地使用内部专用网络和公共互联网络,而是要利用Internet技术建立自己的内部网.本文主要探讨了VPN的概念、VPN的特点、VPN的安全技术以及VPN在我国的发展现状. 相似文献
3.
目前我省气象系统信息化建设已经初具规模,建立了全省的气象专线网络,各地市台站全部用专线连接做到了数据实时传输,大大地提高了数据的时效性,但这样的专线网络仍然存在着一些问题。主要集中在无法实现移动办公的需求以厦现有专线一旦出现故障,没有合理的备份线路作为补充。针对这些问题,我们采用目前流行的VPN技术进行组网。文章主要介绍VPN技术,探讨当前网络情况下我省气象系统网络VPN的组建方案及VPN的安全策略。 相似文献
4.
黄营 《数字社区&智能家居》2006,(8):50-50,148
介绍了多协议标记交换技术的基本构成与基本原理,提出了使用多协议标记交换技术在公共网络上建立虚拟专网的方法,并给出了一个通用实例。 相似文献
5.
当前,在智能手机操作系统市场上占有率最高的Android和iPhoneOS都在系统中集成了VPN技术应用服务,使用手机VPN的用户也在迅速增多。由于境外VPN服务具有躲避信息网络监管、隐藏用户真实IP的特点,极易成为威胁我国信息网络安全的巨大隐患和严峻挑战。文章提出将境外VPN服务纳入到我国法律管理,加强境外VPN服务市场管理等对策,旨在从根本上解决手机VPN技术应用在信息网络安全领域带来的冲击。 相似文献
6.
VPN安全-隧道技术研究 总被引:3,自引:0,他引:3
本文阐述了VPN及其实现的主要技术——隧道。先探讨了VPN的产生背景及其能够实现的功能,VPN利用不可靠的公用互联网络作为信息传输媒介。通过附加的安全隧道,用户认证,访问控制等技术实现与专用网络类似的安全性能:接着分析了实现VPN的隧道技术和隧道协议,并着重分析了第二层隧道协议和IPSec第三层隧道协议的实现原理。 相似文献
7.
MPLS网络技术及应用 总被引:1,自引:0,他引:1
本文主要介绍了当前在宽带网中应用广泛的MPLS技术,并对其应用作了简单说明。MPLS将二层技术和三层技术有机地融合在一起,为用户提供了传输效率高,质量有保证的网络环境。 相似文献
8.
9.
该文首先介绍了目前流行的MPLS/BGP VPN技术,在深入了解MPLS/BGP VPN技术的基础上,结合云南省电子政务网的特点,以几个专网为例,介绍了MPLS/BGP-VPN技术在云南省电子政务网上的应用。 相似文献
10.
随着VPN技术的发展,越来越多的科研机构致力于相关协议的开发和研究。该文通过分析PKI和IPSec的发展状态、趋势、技术特点以及在网络安全中所起到的作用,提出将PKI应用到IPSec网关构建高安全VPN的思想。然后认真分析了将PKI应用到IPSecVPN网关的技术要点,认为构建一个安全的认证中心和设计适用于IPSec应用的数字证书是实现该技术的一个关键。 相似文献
11.
12.
Lin Yang Haiwei Dong Abdulhameed Alelaiwi Abdulmotaleb El Saddik 《Multimedia Tools and Applications》2016,75(24):17121-17155
With advances in lasers, optics, and electronics, many new 3D display technologies have been proposed with prototypes in research labs or have entered the marketplace. Although some of these technologies (such as Stereoscopy) are familiar to people, other technologies, such as holography, remain far-fetched to most. This survey introduces the principles of current popular 3D display technologies, which are generally categorized into four categories: 3D movies, on-stage holograms, holographic projections and volumetric 3D displays. Furthermore, the limitations of each of the aforementioned technologies are deeply analyzed, and comparisons of these technologies are provided. Moreover, we note appropriate application situations for the various technologies. Because computer-generated hologram (CGH) technologies are considered to be the next generation of 3D display technology and have become a dominant direction in 3D display technology development, we address the challenges that CGH is currently facing and provide an insightful analysis of solutions proposed in recent years. Finally, we study the current 3D display applications associated with the four categorized technology principles. 相似文献
13.
Lei Gao Shuo Zhang Ziyao Liu Jinyong Lin Shuai Wang Chengwen Xing 《中国科学:信息科学(英文版)》2016,59(12):121301
Multi-antenna technologies have already achieved a series of great successes in the development of information networks. For future space-ground integrated networks (SGINs), the traditional various kinds of separated information networks will converge to a whole fully connected information network to provide more flexible and reliable services on a world scale. Regarding their great successes in existing systems, multiantenna technologies will be of critical importance for the realization of SGINs and multi-antenna technologies are definitely one of the most important enabling technologies for future converged SGINs. In this article, a comprehensive overview on multi-antenna technologies is given. We first investigate multi-antenna technologies from a theoretical viewpoint. It is shown that we can understand multi-antenna technologies in a general and unified point of view. This fact has two-fold meanings. First, the research on multi-antennas can help us understand the relationships between different technologies e.g., OFDMA, CDMA, etc. On the other hand, multi-antenna technologies are easy to integrate into various information systems. Following that, we discuss in depth the potentials and challenges of the multi-antenna technologies on different platforms and in different applications case by case. More specifically, we investigate spaceborne multi-antenna technologies, airborne multi-antenna technologies, shipborne multi-antenna technologies, etc. Moreover, the combinations of multiantenna technologies with other advanced wireless technologies e.g., physical layer network coding, cooperative communication, etc., are also elaborated. 相似文献
14.
智能合约作为可信的去中心化应用,获得了广泛的关注,但其安全漏洞问题对其可靠性带来了巨大威胁.为此,研究者们利用各种前沿技术(如模糊测试、机器学习、形式化验证等)研究了多种漏洞检测技术,并取得了可观的效果.为了系统性地梳理与分析现有智能合约漏洞检测技术,搜集截至2021年7月关于智能合约漏洞检测的84篇论文,根据它们的核心方法进行分类,从每种技术的实现方法、漏洞类型、实验数据等方面展开分析,同时对比国内外研究现状在这些方面的差异.最后,对现有的智能合约漏洞检测技术进行总结,探讨面临的挑战,并展望了未来的研究方向. 相似文献
15.
基于定位技术(LBS)业务的增长,使得高灵敏度卫星导航技术逐渐成为热点.分析了辅助卫星导航(Assisted-GNSS)技术,提出了辅助导航定位的解决方案,介绍了Galileo/GPS双模高灵敏度接收机设计的一些关键技术. 相似文献
16.
针对基于内容邮件过滤器的攻击及过滤改进 总被引:1,自引:0,他引:1
基于内容的过滤技术是反垃圾邮件技术中最有效的方法,但是垃圾邮件发送者千方百计利用各种方法对基于内容的垃圾邮件过滤器进行攻击,严重影响了过滤器的正确率和健壮性.在介绍主要基于内容的垃圾邮件过滤技术基础上,分析了针对基于内容垃圾邮件过滤器的常用攻击方法,并提出了相应的过滤改进技术.同时,针对单词沙拉攻击,在几种过滤器上进行了模拟攻击实验.最后分析了垃圾邮件技术的发展趋势和未来反垃圾邮件技术的主要改进方法. 相似文献
17.
Levent V. Orman 《Information Systems Frontiers》2002,4(2):213-228
The impact of information technologies on organizations is difficult to predict, although critical for developing comprehensive organizational strategies. Much of the difficulty is traceable to the treatment of all information technologies as a single factor, when in fact different technologies may have drastically different impacts on the organization. Specifically, the distinction between two general classes of technologies, communication and information processing technologies, is studied. An analytical model is developed to show that these two classes of technologies have exactly the opposite impacts on the organization. Moreover, the impact also depends on the organization, and its existing structure. Communication intensive and processing intensive organizational structures are distinguished and they are shown to be impacted differently by information technologies. An analytical framework is developed to show a continuum of organizational structures, depending on their relative communication and processing intensity, and the effect of various technologies is shown to be to move the organization along that continuum. Communication and information processing technologies are shown to move the organization in opposing directions. Finally, the analytical framework is shown to be robust and valid under a wide variety of conditions, covering most real life organizations. 相似文献
18.
19.
网络信息监控与取证的核心技术是目前保障网络安全最有效的应用技术。针对网络文化信息监控的需要和监控的特点,在现有监控技术基础上,对监控与取证技术的新内涵进行了简要介绍,对几种监控与取证的核心技术进行了仿真分析,采用原理推论的方法,得出了5种监控应用技术的应用范围、适用性及其特点,以及监控与取证的最终目的在于信息审计与证据留存的结论,提出了在线监控网络文化信息系统建设的新的建议。 相似文献
20.
在使用面向对象技术的应用开发中需要存储的是对象,而在关系型数据库中存储的是基本类型的数据,这就使得应用程序和关系型数据库之间的存储类型出现不匹配的现象,对象持久化存储技术可以解决这一问题。简要回顾了在Java技术平台下,对象持久存储的一些基本技术如JDBC/SQL、对象/关系映射技术等。然后对JDO和序列化(Serialization)作了进一步的阐释,指出了它们各自的技术特点,并对其长处和弊端加以比较分析,以及它们各自所适合的应用项目。 相似文献