| 1. | Method starts transport layer security encryption 方法启动传输层安全加密。 |
| 2. | Method ends transport layer security encryption 方法结束传输层安全加密。 |
| 3. | No transport layer security is used 未使用任何传输层安全协议。 |
| 4. | Transport layer security tls 传输层安全 |
| 5. | Information technology - telecommunications and information exchange between systems - transport layer security protocol 信息技术.系统间信和信息交换.传输层安全协议 |
| 6. | Information technology . telecommunications and information exchange between systems . transport layer security protocol 信息技术.系统间电信和信息交换.传输层安全协议 |
| 7. | Tls ( transport layer security ) is capable of authenticating both the client and the server and creating a encrypted connection between the two Tls协议(传输层安全)能够在客户机与服务器之间认证,建立加密连接 |
| 8. | Security and authentication features , including support for kerberos v5 , secure sockets layer v3 , and transport layer security using x . 509v3 certificates 安全性和身份验证功能,包括支持kerberosv5 、安全套接字层协议v3和使用了x . 509v3证书的传输层安全保护。 |
| 9. | Follow along to find out how these two apis combine to provide the core functions of the j2ee web application security framework : authentication , authorization , and transport - level security 跟随作者去发现如何结合这两个api以提供j2ee web应用程序安全框架的核心功能:认证、授权和传输层安全。 |
| 10. | The tls ( transport layer security ) protocol is extensible , meaning that new algorithms can be added for any of these purposes , as long as both the server and the client are aware of the new algorithms Tls协议(传输层安全)协议是可扩展的,这意味着可以为此用途添加新算法,只要客户机和服务器双方都知道这个新算法 |