Description: 本方法可以将图像或水印置乱,保护水印图像在网络中安全传送!-This method can be image or watermark scrambling to protect the watermark image transmission in the network security! Platform: |
Size: 1024 |
Author:代江艳 |
Hits:
Description: is a network/security tool that locates and describes all listening tcp ports on a
(remote) host or on many hosts in a bandwidth utilisation maximising, and
process resource minimising manner.
Platform: |
Size: 35840 |
Author:rebbe |
Hits:
Description: Wireless Sensor Networks are wireless networks where every nodes recolects surrounding information. WSNs have several aplications such as militar survival, traffic control, building security, scientific research in other planets, etc. This project presents a communication protocol for wireless sensor networks based on the ant colony optimization metaheuristic, which uses artificial ant agents that recolects data from all sensor nodes of the network. Every ants fuzes data from a node and sends it to every other sensor and then to the base station. All ants look for a way to go where there is an energy eficient path. Platform: |
Size: 60416 |
Author:rodrigo |
Hits:
Description: 在社会信息化的推动下,作为其核心的数字化技术已步入研究开发阶段。为了实现粮库的温湿度自动检测,提高粮库储粮的安全性是粮库管理实现自动化、智能化。我们提出基于ZigBee多点粮库温湿度检测的方案。为此论文开展于无线传感器网络技术的温湿度数据采集系统的研制工作。ZigBee无线传感器网络是一种新兴的传输技术,将其应用于室内温度和湿度的采集,进而构成无线温湿度采集系统。论文介绍了无线传感器网络系统的体系结构及关键技术。-In society, driven by information technology, as part of its core digital technology has entered a stage of research and development. Depot in order to achieve automatic detection of the temperature and humidity to enhance the security of grain storage grain depot management is automated, intelligent. ZigBee Based on our multi-point detection of grain temperature and humidity program. Carried out for this thesis in the wireless sensor network technology, temperature and humidity data acquisition system development. ZigBee wireless sensor networks is a new transmission technology, will be applied to the indoor temperature and humidity of the collection, which constitutes a collection system of wireless temperature and humidity. This paper introduces wireless sensor network system architecture and key technologies. Platform: |
Size: 149504 |
Author:hithdjsj |
Hits:
Description: Security in wireless sensor networks is currently provided
through symmetric key cryptography. Although the low
computational complexity involved in private key algorithms is
advantageous, session keys must be embedded in the sensor nodes
before the nodes can be deployed. Protocols are also necessary to
ensure synchronization of keys between the devices on a network.
These protocols require significant communication and storage
overhead. The limitation of such a cryptosystem is that it is not
possible to guarantee the confidentiality of the session keys Platform: |
Size: 179200 |
Author:yared |
Hits:
Description: Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM.
Design and implement effective network solutions by mastering the design process that is used by successful networking professionals
Understand the diversity of solutions for the SMB environment, avoiding the pitfalls of the one-size-fits-all approach
Create effective and customizable security solutions across the spectrum of SMB types and sizes
Exploit the trend of universal communications convergence by expanding into the VoIP market with the Cisco IP Telephony and unified communication solutions
Break into the fast-growing CRM marketplace with the Cisco CRM integration solutions
Implement wireless LAN solutions that facilitate productivity and workforce optimization-Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM.
Design and implement effective network solutions by mastering the design process that is used by successful networking professionals
Understand the diversity of solutions for the SMB environment, avoiding the pitfalls of the one-size-fits-all approach
Create effective and customizable security solutions across the spectrum of SMB types and sizes
Exploit the trend of universal communications convergence by expanding into the VoIP market with the Cisco IP Telephony and unified communication solutions
Break into the fast-growing CRM marketplace with the Cisco CRM integration solutions
Implement wireless LAN solutions that facilitate productivity and workforce optimization
Platform: |
Size: 1599488 |
Author:Ivan |
Hits:
Description: O Reilly出版的有关802.11无线网络安全方面的权威著作,是研究无线网络安全技术人员重要的参考书籍-Reilly published on 802.11 wireless network security authority of the book is to study the wireless network security and technical personnel an important reference book Platform: |
Size: 835584 |
Author:matt |
Hits:
Description: 《linux操作员》
linux 网络安全 LAMP系统工程师 嵌入式工程 操作系统维护 程序员-" Linux Operator" linux network security systems engineer LAMP programmers to maintain an embedded operating system works Platform: |
Size: 968704 |
Author:李斌 |
Hits:
Description: 密码学部分 数据库,操作系统安全部分 网络安全部分-Cryptography, part of the database, operating system, part of the security part of the network security Platform: |
Size: 8505344 |
Author:李新 |
Hits:
Description: This paper presents the design and
implementation of a crypto processor, a special-purpose
microprocessor optimized for the execution of
cryptography algorithms. This crypto processor can be used
for various security applications such as storage devices,
embedded systems, network routers, etc. Platform: |
Size: 452608 |
Author:dudeafroz |
Hits:
Description: Cognitive radios sense spectrum activity and apply
spectrum policies in order to make decisions on when and in what
bands they may communicate. These activities go beyond what is
done when traditional radios communicate. This paper examines
the denial of service vulnerabilities that are opened by these
additional activities and explores potential protection remedies
that can be applied. An analysis of how vulnerable are victim
cognitive radios to potential denial of service attacks is presented
along different axis, namely the network architecture employed,
the spectrum access technique used and the spectrum awareness
model. The goal is to assist cognitive radio designers to incorporate
effective security measures now in the early stages of cognitive
radio developmen. Platform: |
Size: 121856 |
Author:mohammedo |
Hits:
Description: Basic theory of privacy - the basis of cryptography and privacy certified mountain base year, is a theory - software security, theory and practice of network security - protecting the actual information system development case study examples Platform: |
Size: 4388864 |
Author:bk |
Hits:
Description: 网络安全一直是我们头痛的问题,这个是老师的课件,希望能有很大的帮助-Network security has always been our headache, this is the teacher' s courseware, hoping to be very helpful Platform: |
Size: 11480064 |
Author:王健松 |
Hits:
Description: 交换技术经典外文教材,适用于电脑网络,通信技术-In designing a network device, you make dozens of decisions that affect the speed with which it will performsometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principlesranging from the commonly recognized to the groundbreakingthat are key to breaking these bottlenecks.The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who ha Platform: |
Size: 2243584 |
Author:opaque |
Hits:
Description: 无线传感器网络的一本书籍,介绍无线传感器网络安全的一本较新英文书籍,介绍了目前最新的一些无线传感器网络安全的一些算法。-Wireless sensor networks a book to introduce the wireless sensor network security, a relatively new books, introduces the latest of a number of wireless sensor network security, some algorithms. Platform: |
Size: 41047040 |
Author:liangzhimao |
Hits:
Description: 网络安全方面较为详细的资料,包括数据加密,数据认证,网络安全工程等。-Network security is more detailed information, including data encryption, data authentication, network security engineering. Platform: |
Size: 1404928 |
Author:just |
Hits: