期刊文献+

WPKI研究与仿真

Research on and Simulation of WPKI
下载PDF
导出
摘要 开创性地对构成WPKI的关键组件(如:PKI Portal,WPKI CA,目录服务器,WAP网关)进行仿真;对WTLS协议进行仿真。研究了WPKI体系结构、WTLS协议,对其进行仿真,进行性能分析。通过相关研究与仿真,我们认为工作的成果总体上是有效的,对实际的应用系统也有相当大的参考价值。 The establishment of the simulating platform for WPKF creatively simulates the key part of WPKl such as PKI Portal, WPKI CA, catalogue server. WAP Gateway and WTLS certificate construction. The work result of the relevant researches and simulations as a whole is considered to be effectual, which is of great reference value for practical application system.
出处 《东莞理工学院学报》 2004年第4期1-5,共5页 Journal of Dongguan University of Technology
  • 相关文献

参考文献8

  • 1[1]Sandra Kay Miller.Faciug the challenge of wircless security,Computer,Volume:34 Issue:7,July 2001 Page(s):16-18.
  • 2[2]Albert Levi,Erkay Savas.Performancc Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol.Proceedings of Eighth IEEE International Symposium onComuptcrs and Communication(ISCC'03) 2003.
  • 3[3]Christonph Hanle,Markus Hofmann.Performance Comparison of Reliable Multicast Protocols using the Nctwork Simulator ns-2[A].Proceeding of the Annua] Conference on Local Computer Networks (LCN) [C],Boston,MA,USA,October 1998.
  • 4[4]Yeali S.Sun,Chin-Fu Ku,Yu-Chun Pan,Chia-Hui Wang,Jan-Ming Ho.Pcrformance analysis of application-level traffie shaping in a rcal-time multimedia confcrencing system on Ethcrnets.Local Computer Networks,1996.,Proceedings 21st IEEE Conference on,13-16 Oct.1996 Page(s):433 -442.
  • 5[5]VICfOR S.FROST,WILLIAM WOOD LARUE,JR.,K.SAM SHANMUGAN.Efficient techniques for the simulation of computer communications networks.Sclected Arcas in Communications,iE EE Journal on,Volume:6 issue:I,.Jan.1988 Page(s):146 -157.
  • 6[6]Gupta.V.:Gupta,S._Expcriments in wircless Internet security,Wirelcss Communications and Networking Conference,2002.WCNC2002.2002 IEEE,Volume:2,17-21 March 2002 Page(s),(2):860 -864.
  • 7[7]Wirclcss Public-Key Infrastructure.CA,USA:CERTICOM Corporation,2001.
  • 8[8]I.Herwono,I.L iebhardt.Performance of WTLS and its Impact on an M-Commerce Transaction.Xi'an China:Proceedings of the Third International Conference on Information and Communications Security(ICICS'01),Nov.2001,pp167-171.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部