Location:
Search - Secure Routing
Search list
Description: ANts P2P realizes a third generation P2P net.
It protects your privacy while you are connected and makes you not trackable,
hiding your identity (ip) and crypting everything you are sending/receiving from others.
Features
Open Source Java implementation (GNU-GPL license)
Multiple sources download
Swarming from partial files
Automatic resume and sources research over the net
Search by hash, string and structured query
Completely Object-Oriented routing protocol
Point to Point secured comunication: DH(512)-AES(128)
EndPoint to EndPoint secured comunication: DH(512)-AES(128)
Serverless GWebCache-based peer dicovery procedure
IRC based peer discovery system
IRC embeded chat system
Full text search of indexed documents (pdf, html, txt, doc etc) -> QUERY REFERENCE.
Distributed/Decentralized Search engine
HTTP tunneling
ANts allow P2P communications through any kind of HTTP Proxy
ANts allow P2P communications through any kind of NAT or traffic filtering system
-ANts P2P realizes a third generation P2P ne t. It protects your privacy while you are connec ted and makes you not trackable, hiding your identity (ip) and crypting everyth ing you are sending / receiving from others. Fea tures Open Source Java implementation (GNU-GP L license) Multiple sources download Fog from Automatic resume partial files and source 's research over the net Search by hash. and structured query string Completely Object - Oriented routing protocol Point to Point secu red comunication : DH (512) - AES (128) EndPoint to secure EndPoint d comunication : DH (512) - AES (128) Serverless GWebCache-base d peer dicovery procedure IRC based peer discov ery system IRC chat system embeded Full text sea rch of indexed documents (pdf, html, txt, doc etc) -
Platform: |
Size: 7742358 |
Author: 谭朋柳 |
Hits:
Description: 关于无线传感器网络的一片非常好的资料,很好的啊!-on wireless sensor networks a very good, very good ah!
Platform: |
Size: 30720 |
Author: huyanhua |
Hits:
Description: ANts P2P realizes a third generation P2P net.
It protects your privacy while you are connected and makes you not trackable,
hiding your identity (ip) and crypting everything you are sending/receiving from others.
Features
Open Source Java implementation (GNU-GPL license)
Multiple sources download
Swarming from partial files
Automatic resume and sources research over the net
Search by hash, string and structured query
Completely Object-Oriented routing protocol
Point to Point secured comunication: DH(512)-AES(128)
EndPoint to EndPoint secured comunication: DH(512)-AES(128)
Serverless GWebCache-based peer dicovery procedure
IRC based peer discovery system
IRC embeded chat system
Full text search of indexed documents (pdf, html, txt, doc etc) -> QUERY REFERENCE.
Distributed/Decentralized Search engine
HTTP tunneling
ANts allow P2P communications through any kind of HTTP Proxy
ANts allow P2P communications through any kind of NAT or traffic filtering system
-ANts P2P realizes a third generation P2P ne t. It protects your privacy while you are connec ted and makes you not trackable, hiding your identity (ip) and crypting everyth ing you are sending/receiving from others. Fea tures Open Source Java implementation (GNU-GP L license) Multiple sources download Fog from Automatic resume partial files and source 's research over the net Search by hash. and structured query string Completely Object- Oriented routing protocol Point to Point secu red comunication : DH (512)- AES (128) EndPoint to secure EndPoint d comunication : DH (512)- AES (128) Serverless GWebCache-base d peer dicovery procedure IRC based peer discov ery system IRC chat system embeded Full text sea rch of indexed documents (pdf, html, txt, doc etc)-
Platform: |
Size: 7742464 |
Author: 谭朋柳 |
Hits:
Description: 基于无线传感器网络的一种安全路由协议
针对无线传感器网络(WSN)中路由协议的安全隐患,提出了一种安全的路由协议.该路由协
议在传统的定向扩散协议基础上增加安全机制,把整个路由过程分为路由建立和路由更新2个阶段,并对其安
全性进行分析.通过在路由建立阶段使用小区密钥和通信密钥,能为网络选择安全的路由;路由更新能在出
现路由故障时重新建立路由,进一步提高了无线传感器网络的路由安全性能.
-Wireless sensor networks based on a secure routing protocol for wireless sensor network (WSN) routing protocol in the security risk, a routing protocol security. The routing protocol in the traditional orientation to increase the proliferation of agreements based on the security mechanism, the entire routing process is divided into routing updates and routing to establish two stages, and its security analysis. Routing through the cell-key establishment phase and communication using the key security options for network routing routing update to routing in the event of failure to re-establish routing to further improve the routing of wireless sensor network security .
Platform: |
Size: 522240 |
Author: 池尚琨 |
Hits:
Description: Secure routing in wireless sensor network wsn by dynamic key route
Platform: |
Size: 268288 |
Author: nes |
Hits:
Description: Wireless sensor network secure routing protocol
key route fuzzy algorithm
Platform: |
Size: 312320 |
Author: nes |
Hits:
Description: Secure routing protocol AODV
Platform: |
Size: 4064256 |
Author: refa3y |
Hits:
Description: ABSTRACT
In this paper we put forward a kind of secure LEACH routing protocol (SC-LEACH) based on low-power clusterhead selection algorithm. This protocol gets the total number of all nodes by their collaboration in selecting, to precisely calculate the present thresholds with which the
cluster-heads is generated. Consequently, the probability of producing optimal cluster-heads in each round is the biggest,and the variance is the smallest, thus the network reaches its
optimal energy cost. The adoption of pre-shared key pair dispatch improves the security of the routing effectively. Comparing with the LEACH protocol using symmetric keys
dispatch, the simulation validates the effectiveness of SCLEACH.
Platform: |
Size: 1276928 |
Author: Amir |
Hits:
Description: SECURE LEACH ROUTING PROTOCOL BASED ON LOW-POWER CLUSTER-HEAD
Platform: |
Size: 1276928 |
Author: samboy |
Hits:
Description: Secure Antnet Routing Algorithm for Scalable Adhoc Networks
Using Elliptic Curve Cryptography
Platform: |
Size: 106496 |
Author: dema |
Hits:
Description: ns 2 simulator in secure routing protocols for mibile ad-hoc networks .
it`s sample example explan how to begin with the simulation
Platform: |
Size: 51200 |
Author: yossef |
Hits:
Description: The Quidway® S8500 switch series (S8500 for short) is a new-generation 10G core routing switch
platform developed by Huawei geared towards applications in enterprise campus network core layers
and carriers IP metropolitan-area network (MAN) core or distribution layers for its intelligent, scalable
architecture, as well as its converged, secure and reliable performance.-The Quidway® S8500 switch series (S8500 for short) is a new-generation 10G core routing switch
platform developed by Huawei geared towards applications in enterprise campus network core layers
and carriers IP metropolitan-area network (MAN) core or distribution layers for its intelligent, scalable
architecture, as well as its converged, secure and reliable performance.
Platform: |
Size: 1247232 |
Author: imachol |
Hits:
Description: Bluetooth (BT) is presently the primary wireless technology for short range Personal Area Networks (PAN). Piconet is the basic unit of networking in BT that contains one master and from one to seven active salve devices. Piconets can be interconnected to form a Scatternet. Scatternet formation and routing are the important areas on which considerable research has been done so far. Security is another important issue for BT scatternets. BT specification provides security measures for Piconets but secure communication in a scatternet is an open problem. In our research we specifically consider routing security in BT scatternets. We describe a number of routing threats and then present an authenticated routing scheme which is based on Zone Routing Protocol. We evaluate the scheme through simulation and show that it effectively secures the route discovery process in BT scatternets.
Platform: |
Size: 2048 |
Author: varinder |
Hits:
Description: 2011 - Secure Routing Protocol in Mobile Ad Hoc Networks – A Survey and Taxonomy
Platform: |
Size: 92160 |
Author: Mohamed Abdelshafy |
Hits:
Description: Secure Adhoc On Demand Distance Vector Routing
Platform: |
Size: 81920 |
Author: Adil |
Hits:
Description: Secure On Demand Distance Vector Routing in Ad Hoc Networks-Secure On Demand Distance Vector Routing in Ad Hoc Networks
Platform: |
Size: 328704 |
Author: Diego |
Hits:
Description: DSRParser.Java used for Secure Routing in Mobile Ad Hoc Networks
Platform: |
Size: 1024 |
Author: ashish |
Hits:
Description: authenticated anonymous secure routing for manet.
this folder contain all the files for aasr routing protocol
Platform: |
Size: 591872 |
Author: sudhesh |
Hits:
Description: Secure routing in wireless sensor networks: attacks and countermeasures
Platform: |
Size: 13312 |
Author: dalila |
Hits:
Description: An On-Demand Secure Routing Protocol Resilient to
Byzantine Failures
Platform: |
Size: 187392 |
Author: babamehrdad
|
Hits: