搜索结果: 1-1 共查到“downgrade”相关记录1条 . 查询时间(0.546 秒)
Key-exchange protocols such as TLS, SSH, IPsec, and ZRTP are highly configurable, with typical deployments supporting multiple protocol versions, cryptographic algorithms and parameters. In the first ...