ike

  • 网络艾克;密钥交换;Internet密钥交换;互联网密钥交换;威而信
ikeike

noun

1
United States general who supervised the invasion of Normandy and the defeat of Nazi Germany;34th President of the United States (1890-1961)
Synonym: Eisenhower Dwight Eisenhower Dwight D. Eisenhower Dwight David Eisenhower President Eisenhower

数据来源:WordNet

  1. Research on performance testing of IKE protocol

    密钥交换协议性能测试研究

  2. A black box testing method aiming at IKE ( Internet Key Exchange ) protocol performance was proposed , which was based on the self-developed platform of protocol integrated test system .

    提出了一种针对密钥交换(IKE)协议性能的黑盒测试方法,该方法基于自主开发的协议集成测试系统平台。

  3. Ike doesn 't know how such a rumor got about .

    艾克不知这样的谣言是怎么传开的。

  4. Analysis and design of high intensity IKE protocol based on PKI authentication

    基于PKI身份认证的高强度IKE协议分析与设计

  5. This test method is applicable to IKE tests in different devices .

    该方法可用于测试多种不同设备上的IKE实现。

  6. Ike everything you need for a good working relationship .

    听上去你们合作的不错嘛。

  7. The Research on IKE Protocol Against Man in the Middle Attack

    IKE协议抵抗中间人攻击的研究

  8. Analysis and Improvements on the Identity Protection Mechanism of IKE Protocol

    IKE协议中身份保护机制的分析与改进

  9. Improved Design of IKE and the Framework of Its Implementation

    IKE协议的改进及其实现框架

  10. Analysis of Identify Mechanism and Its Implementation of IKE

    IKE协议认证机制及其实现分析

  11. Analysis and Improvement of the Main Mode Authentication of IKE with Digital Signature

    基于数字签名的IKE主模式认证机制的分析与改进

  12. Internet Key Exchange ( IKE ) and Its Implementation in Linux

    Internet密钥交换(IKE)及其在Linux系统中的实现

  13. Research of Main Mode with Signature Authentication in IKE Protocol

    IKE协议中基于数字签名验证的主模式研究

  14. IKE ensures establishing dynamic links and security of establishing process .

    IKE保证了如何动态地建立安全关联和建立过程的安全。

  15. Study on Identification Authentication Techniques Used in IKE

    IKE中的身份认证技术研究

  16. The IKE agreement also became the hotspot to study IPSec .

    IKE协议也成为了当前研究IPSec协议的热点。

  17. Design and implementation of safe VPN model in IKE

    安全VPN模型中IKE协议的设计与实现

  18. IKE - manage program is application for user .

    IKE管理程序被设计成用户执行的应用程序。

  19. Analysis Revision of the Authentication Mode of the IKE Protocol

    IKE协议认证方式分析和改进

  20. Security Protection Mechanism Based on IKE in IPSec

    IPSec中基于IKE的安全防范机制

  21. Analysis and Improvement on Authentication with Pre - shared Key in IKE Protocol

    IKE协议中预共享密钥认证的分析及改进

  22. Security Analysis and Improvement on IKE Protocol in IPsec

    IPsec中密钥交换协议IKE的安全性分析及改进

  23. He won a war and two elections , and made everybody like Ike .

    他赢了一场战争和两次选举,人人都喜欢他。

  24. Study and implementation of IKE 's probe proposal

    基于隧道IKE探测方案的研究与实现

  25. Analysis and Improvement on the PSK Identity Authentication Mode in the IKE Protocol

    IKE中的PSK身份认证模式的分析与改进

  26. Ike followed the military staff system .

    艾克则沿袭军事参谋制度。

  27. The Secure Remote Access Based On IKE

    基于IKE的安全远程接入

  28. Capability Analysis and Improvement of IKE Protocol in Defence of Man-in-the-Middle Attack

    IKE协议防止中间人攻击性能分析及改进

  29. Finally , it introduces the next generation edition : IKE v2 .

    最后,介绍了IKE下一代版本IKEV2。

  30. New characteristics analysis of IKE V2

    IKEV2新特性浅析