责问 发表于 2025-3-25 06:37:44

http://reply.papertrans.cn/59/5876/587594/587594_21.png

懒鬼才会衰弱 发表于 2025-3-25 09:16:10

http://reply.papertrans.cn/59/5876/587594/587594_22.png

褪色 发表于 2025-3-25 12:20:13

http://reply.papertrans.cn/59/5876/587594/587594_23.png

canvass 发表于 2025-3-25 19:36:26

http://reply.papertrans.cn/59/5876/587594/587594_24.png

缩影 发表于 2025-3-25 23:43:16

http://reply.papertrans.cn/59/5876/587594/587594_25.png

arthroscopy 发表于 2025-3-26 02:47:42

http://reply.papertrans.cn/59/5876/587594/587594_26.png

憎恶 发表于 2025-3-26 04:24:08

Covert channels in LAN protocols,not a question of a LAN‘s architecture, but is strongly dependent on the design of its internal interfaces and on its implementations..The paper describes how these channels may be blocked and emphasizes the necessity to investigate the design and implementation of the protocols as part of an evaluation of a LAN.

Glutinous 发表于 2025-3-26 11:41:54

http://reply.papertrans.cn/59/5876/587594/587594_28.png

Vaginismus 发表于 2025-3-26 13:08:08

http://reply.papertrans.cn/59/5876/587594/587594_29.png

Prophylaxis 发表于 2025-3-26 20:28:39

Access control and authentication in LANs,ese mechanisms must be integrated into the protocol architecture in a way that will not interfere with or be redundant to very similar security mechanism implemented in higher layers operating across the wide area network. A model for such mechanisms in the context of IEEE 802 LANs is proposed.
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Local Area Network Security; Workshop LANSEC ‘89. Thomas A. Berson,Thomas Beth Conference proceedings 1989 Springer-Verlag Berlin Heidelber