Welcome![Sign In][Sign Up]
Location:
Search - security wireless

Search list

[Other resourceWAPxieyi

Description: WAP无线应用协议.包括WAE Wireless Application Enviromnent 无线应用环境, WAP Wireless Application Protocol 无线应用协议,WDP Wireless Datagrm Protocol 无线数据报协议,WML Wireless Markup Language 无线标记语言,WSP Wireless Session Protocol 无线会话协议,WTA Wireless Telephony Application 无线电话应用,WTLS Wireless Transport Layer Security 无线传输层安全,WTP Wireless Transaction Protocol 无线事务协议-Wireless Application Protocol. WAE including Wireless Application En viromnent wireless application environment, WAP Wireless Application Protocol Wireless Application Protocol. WDP Wireless Datagrm Protocol wireless data protocol, WML Wireless Markup Language Wireless Markup Language. WSP Wireless Session Protocol wireless conversation agreement WTA Wireless Telephony Application mobile applications, WTLS Wireless Transport Layer Security Wireless Transport Layer Security CHAIRMAN, WTP Wireless Transaction Protocol Wireless Services Agreement
Platform: | Size: 16768100 | Author: 马弘历 | Hits:

[OtherBulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security

Description: Wireless Security is a vast topic and any attempt to address all issues in a single book is a daunting task. It is almost impossible to explain each and every security algorithm that is used in wireless security in detail in a single volume.
Platform: | Size: 2599101 | Author: yeahelton@hotmail.com | Hits:

[matlab802.11Security

Description: Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.-Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in Theor y and practice of wireless security, dispelling some of the myths along the way. In do ing so, they provide you with the technical grounding r equired to think about how the rest of the book ap plies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--ba sed systems. you ll want this book beside you every step of the way.
Platform: | Size: 835584 | Author: | Hits:

[Software Engineeringwireless

Description: 无线智能安防系统的方案,可以给大家做安防的人有一些设计经验的分享。-Wireless Intelligent Security Systems program, you can give us security people do have some design experience-sharing.
Platform: | Size: 246784 | Author: 吕海安 | Hits:

[3G developcoco

Description: 无线传感器网络QoS保证技术 无线传感器网络数据融合技术 无线传感器网络安全机制-Wireless sensor network to guarantee QoS technology wireless sensor network data fusion technology wireless sensor network security mechanisms
Platform: | Size: 141312 | Author: coco | Hits:

[OtherWirelessSecurityEssentials

Description: 无线安全系列的一本好书,国外经典教材,值得一看-Wireless security series of a good book, a classic foreign materials, worth a visit
Platform: | Size: 4512768 | Author: cuiyanzhe | Hits:

[SCMsecurity

Description: 关于无线传感器网络安全性问题的研究进展和相关讨论的论文。-On wireless sensor network security research progress and related discussion papers.
Platform: | Size: 128000 | Author: 苏可 | Hits:

[OtherSecurity.and.Quality.of.Service.in.Ad.Hoc.Wireles

Description: it is Security and Quality of Service in Ad Hoc Wireless Networks Mar 2008
Platform: | Size: 2507776 | Author: vamsikrishna | Hits:

[Communication-MobileWSNSecurityDemo

Description: Wireless Sensor Network SEcurity demo
Platform: | Size: 336896 | Author: jax | Hits:

[Industry researchadhoc_tutorial_PPT

Description: 详细介绍无线多跳adhoc网络的PPT.包括网络中的MAC层和路由层介绍、常用的协议算法,存在的问题,TCP与UDP协议性能比较,安全问题等,有助于了解Ad hoc网络的概况 -Details of the wireless multi-hop adhoc networks PPT. Including the network MAC layer and routing layer description of the protocol algorithm used, problems, TCP and UDP protocol performance comparison, the security problems, and so help to understand the profile of Ad hoc Networks
Platform: | Size: 4546560 | Author: lily | Hits:

[Program docOReilly.802.11.Wireless.Networks.The.Definitive.G

Description: As a network administrator, architect, or security professional, you need to understand the capabilities, limitations, and risks associated with integrating wireless LAN technology into your current infrastructure. This practical guide provides all the information necessary to analyze and deploy wireless networks with confidence. It?s the only source that offers a full spectrum view of 802.11, from the minute details of the specification, to deployment, monitoring, and troubleshooting.
Platform: | Size: 7806976 | Author: MEONGHUN LEE | Hits:

[Other Embeded programRFID-security-system

Description: This project aimed to develop a wireless system to detect and allow only the authorized persons. The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The passive micro transponder tag collects power from the 125 KHz magnetic field generated by the base station, gathers information about the Tag ID and sends this information to the base station. The base station receives, decodes and checks the information available in its Database and Manchester code was used to send those information. The system performed as desired with a 10cm diameter antenna attached to the transponder. The Base Station is built by using the Popular 8051 family Microcontroller. It gets the tag ID and if the tag ID is stored in its memory then the microcontroller will allow the person inside. RFID Reader Module, are also called as interrogators.
Platform: | Size: 111616 | Author: Binu | Hits:

[Internet-NetworkSensor-Network-Security-A-Survey

Description: 本文是一篇关于传感器网络安全的综述,详细地从各个层介绍了它的研究情况。-Wireless sensor networks(WSNs) use small nodes with constrained capabilities to sense,collect,and disseminate information in many types of applications.As sensor networks become wide-spread,security issues become a central concern, especially in mission-criticaltasks.In this paper,we identify the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analys is ?rst.Then we give a holistic overview of security issues.These issues are divided into seven categories:cryptography,keymanage- ment,attack detections and preventions,securer outing,secure location security,secure data fusion,and other security issues. Along the way we analyze thead vantages and disadvantages of current secure schemes in each category.Inaddition,we also summarize the techniques and methods used in these categories,and point out the open research issues and directions in each area.
Platform: | Size: 348160 | Author: 马宁 | Hits:

[Software EngineeringCyber-Security

Description: Security Wireless security cyber security
Platform: | Size: 167936 | Author: hp | Hits:

[Internet-Network1-Security-Issues-in-Wireless-Sensor-Networks---I

Description: Wireless sensor network in security
Platform: | Size: 78848 | Author: atul | Hits:

[Software Engineeringystem

Description: Zigbee无线传感器网络在安全监测系统中的应用-Zigbee wireless sensor network security monitoring system
Platform: | Size: 358400 | Author: desk | Hits:

[Program docCooperative-Cellular-Wireless-Networks

Description: This are kind of the books that focus on wireless networking that include, Wireless Ad Hoc, Security in Wireless Ad Hoc and Sensor Networks, Cellular and Wireless networking Technology, that I intent to share for improve and development each other for the best new in the world. I hope for the next future will have something new more for the modern technology. Thank you-This are kind of the books that focus on wireless networking that include, Wireless Ad Hoc, Security in Wireless Ad Hoc and Sensor Networks, Cellular and Wireless networking Technology, that I intent to share for improve and development each other for the best new in the world. I hope for the next future will have something new more for the modern technology. Thank you!!!
Platform: | Size: 8784896 | Author: sokun | Hits:

[OS programwsnlwach.tar

Description: this one of security protocol in wireless sensor network
Platform: | Size: 393216 | Author: asautm | Hits:

[Technology Managementwireless-network-setting

Description: 一种安全性较强的无线网络设置,基于TPLink-A strong security wireless network settings, based TPLink
Platform: | Size: 649216 | Author: xihuag | Hits:

[Othersecurity

Description: Approach: NS-2 is an open source system that is developed using C++ and Tool Control Language TCL. Researchers can freely add new components to the system to server their own purposes. The latest version of NS-2 is version 2.28. Within this version, most of the standard protocols supported. You can find protocol from media access layer protocols such as CSMA/CD up to application protocols as FTP and HTTP. For routing protocols, there are unicast and multicast routing protocols for wire network and DSR, DSDV, AODV for wireless ad-hoc networks. Most of these protocols were developed by researchers and adopted into standard version of NS-2. In order to experiment security features for network, we need to add security functions into NS-2. Of course for specific experiments there are specific requirements. The purpose of this project is only to illustrate a way to add security functions into NS-2 Our approach is to build a new protocol at network layer
Platform: | Size: 2048 | Author: bvc | Hits:
« 12 3 4 5 6 7 8 9 10 »

CodeBus www.codebus.net