首页 / 词典 / good

wapi

  • 网络无线局域网鉴别与保密基础结构;无线局域网鉴别和保密基础结构;无线局域网标准;无线认证和保密基础设施
wapiwapi
  1. From 2003 to 2006 , the WAPI disputes rose between China and the US .

    2003-2006年,中美之间产生了关于中国无线局域网标准争端。

  2. Analysis of Security Problem of Authentication Mechanism in WAPI and Solution

    WAPI认证机制安全缺陷分析及解决方案

  3. Improved implementation of WAPI standard based on efficiency and security

    基于效率提高和安全性完善的WAPI标准改进实现

  4. The Research and Implementation of WAPI Authentication on WLAN Access Point

    无线接入点WAPI认证机制的研究与实现

  5. The study of Chinese WLAN security standard WAPI .

    针对中国无线局域网安全标准WAPI及其实施指南展开研究。

  6. WAPI is the WLAN national standard designed by China .

    WAPI协议是我国自行制定的无线局域网国家标准。

  7. Formal Analysis and Verification for Authentication Process of WAPI

    WAPI接入鉴别过程的形式化分析与验证

  8. The Research and Implementation of WAPI Authentication and Encryption Subsystem Based on Enterprise AP

    基于企业级AP的WAPI认证加密子系统的研究与实现

  9. Security Analysis and Improvement to WAPI Certificate Authentication

    对WAPI证书鉴别的安全性分析与改进

  10. Wireless Sensor Networks Based on the WAPI Authentication

    基于WAPI认证协议的无线传感器网络

  11. Research of digital certificates application in WAPI

    WAPI数字证书应用研究

  12. The substantive analysis of the incomplete information game about the controversy of WAPI

    WAPI之争的不完全信息博弈实质分析

  13. It is proved that WAPI can provide the whole security protect for user 's WLAN system .

    从而验证了WAPI能为用户的WLAN系统提供全面的安全保护。

  14. Implementation of China WAPI criterion in the face of plight and its enlightenments

    我国实施WAPI标准面临的困境及启示

  15. On the security and performance of WAPI

    WAPI认证机制的性能和安全性分析

  16. An initial security analysis of the WAPI standard is presented and the improved measure about its authentication is given .

    对WAPI工作原理做了简要的描述,分析了其身份验证中存在的安全问题,并给出了进一步完善认证机制的方法。

  17. Market Demands WAPI , Sailing from China WAPI Standardization and Industrialization Progress Entering into New Stage

    市场需求选择WAPI,并从中国起航&WAPI标准推进和产业化工作进入新阶段

  18. WAPI Protocol and China 's Standard Tactic

    WAPI协议与中国的标准战略

  19. Finally , WAPI is compared with IEEE 802.11i about their security and performance .

    最后对WAPI与IEEE80211i在安全性和性能上进行了比较。

  20. Mutual authentication is achieved between wireless terminal and wireless AP based on digital certificates in WAPI .

    WAPI引入数字证书实现无线终端WT和无线访问节点AP之间的双向鉴别。

  21. The formulation of WAPI criterion was an important trial implementation of criterion strategy in the high-tech industry field of China .

    WAPI标准的出台,是我国在高科技产业领域实施标准战略的一次重要尝试。

  22. The WAPI project schedule control is based on critical chain project management . The core is the management and controlling of buffer .

    WAPI项目进度控制是基于关键链管理的进度控制,核心是对缓冲的管理和控制。

  23. Formalization verification for the security access of WAPI

    WAPI安全接入过程的形式化验证

  24. Several shortcomings of two security standards in WLAN : IEEE 802.11i and WAPI are analyzed on efficiency and security .

    分析了无线局域网的安全标准IEEE802.11i和WAPI在安全与效率上存在的缺陷。

  25. But it is delayed last year by some reason , WAPI of the China national standard should be converted to other corporation and development .

    但是随着强制实施认证在去年宣布无限期推迟后,WAPI中国无线局域网国家标准的实施将必然转入其他方式的合作或其他方式的发展中。

  26. Chinese WAPI criterion is deterred without time limit . It is caused by all kinds of reasons , and brought some losses .

    WAPI标准最终被无限期延迟,这是由多方面的原因造成的,并由此带来了一些损失。

  27. This paper takes the role of government to promote the WAPI standard as to discuss key factors which influence the result of the game and government industry policies .

    以我国政府对WAPI标准的推广为例,通过一个一期的博弈支付讨论,可以看到,在标准竞争中政府行为具有关键性的作用。

  28. In 2003 , Beijing demanded electronics makers to adopt WAPI , a domestic alternative to the global wireless standard WiFi .

    2003年,中国要求电子产品制造商采用中国国内的WAPI标准,取代全球无线标准WiFi。

  29. In WAPI , the STA is not authenticated by AS and the key negotiation protocol is incomplete .

    分析指出WAPI不能实现对STA的真正认证、密钥协商协议不完整、易遭拒绝服务攻击等问题;

  30. On the basis of thoroughly researches on the WAI security access of WAPI , this paper analyzes and verifies the access security with BAN logic .

    在对其中WAI的安全接入过程深入研究的基础上,使用BAN逻辑对该过程进行了形式化的分析和验证。