J4 ›› 2007, Vol. 29 ›› Issue (12): 29-32.
• 论文 • Previous Articles Next Articles
Online:
Published:
Abstract:
This paper analyses various methods for securing the data on the Intemet and the security protocols for the embedded Intemet, in order to provide some feasible references for the designers in this case.
Key words: embedded internet;encryption;key;security protocol
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2007/V29/I12/29