Knowledges and techniques mainly involved are PE File Format, reverse analyzing, process and its virtual memory, the windows message, hook technology, the virtual key technology and injecting and modifying the code dynamically in other process etc. 所用到的技术和所涉及的知识主要有:PE文件格式、逆向分析技术、进程及其虚拟地址空间、windows消息、钩子技术、键盘虚拟技术和内存代码的动态注入和修改等。
Further more, this paper studies VoIP security issues. Second, this paper studies the security of IMS authentication mechanism and brings forword two-way HTTP-S / MIME authentication scheme based on virtual key ring which can reduce the high cost of the pki using. 其次,论文研究了IMS的安全认证机制,提出了基于虚密钥环的双向HTTP-S/MIME认证方案,减少使用PKI的高成本。
Our virtual foreign key is based on two columns from the TB_RIGHT table. 我们的虚拟外键基于TBRIGHT表的两个列。
The Research on the Relational Database Watermarking Based on the Virtual Primary Key 基于虚拟主键的数据库水印技术研究
Database Watermarking Algorithm Based on Virtual Primary Key 一种基于虚拟主键的数据库水印算法