摘要:E
nd-to-end security relies on protocols and mechanisms that
are implemented exclusively on the endpoints of a connection.
The most typical example is an HTTPS connection (based, for
example, on Transport Layer Security (TLS)
[1]
) to a web server; IP
Security (IPsec)
[2]
can also be used for end-to-end security, as was
initially proposed as a default connection mechanism for IPv6.