Welcome![Sign In][Sign Up]
Location:
Search - Secure Routing

Search list

[Other resourceANtsP2P_beta1.5.6_p0.9.3_src_nb

Description: ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others. Features Open Source Java implementation (GNU-GPL license) Multiple sources download Swarming from partial files Automatic resume and sources research over the net Search by hash, string and structured query Completely Object-Oriented routing protocol Point to Point secured comunication: DH(512)-AES(128) EndPoint to EndPoint secured comunication: DH(512)-AES(128) Serverless GWebCache-based peer dicovery procedure IRC based peer discovery system IRC embeded chat system Full text search of indexed documents (pdf, html, txt, doc etc) -> QUERY REFERENCE. Distributed/Decentralized Search engine HTTP tunneling ANts allow P2P communications through any kind of HTTP Proxy ANts allow P2P communications through any kind of NAT or traffic filtering system -ANts P2P realizes a third generation P2P ne t. It protects your privacy while you are connec ted and makes you not trackable, hiding your identity (ip) and crypting everyth ing you are sending / receiving from others. Fea tures Open Source Java implementation (GNU-GP L license) Multiple sources download Fog from Automatic resume partial files and source 's research over the net Search by hash. and structured query string Completely Object - Oriented routing protocol Point to Point secu red comunication : DH (512) - AES (128) EndPoint to secure EndPoint d comunication : DH (512) - AES (128) Serverless GWebCache-base d peer dicovery procedure IRC based peer discov ery system IRC chat system embeded Full text sea rch of indexed documents (pdf, html, txt, doc etc) -
Platform: | Size: 7742358 | Author: 谭朋柳 | Hits:

[Othermhkzhwt

Description: 关于无线传感器网络的一片非常好的资料,很好的啊!-on wireless sensor networks a very good, very good ah!
Platform: | Size: 30720 | Author: huyanhua | Hits:

[P2PANtsP2P_beta1.5.6_p0.9.3_src_nb

Description: ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others. Features Open Source Java implementation (GNU-GPL license) Multiple sources download Swarming from partial files Automatic resume and sources research over the net Search by hash, string and structured query Completely Object-Oriented routing protocol Point to Point secured comunication: DH(512)-AES(128) EndPoint to EndPoint secured comunication: DH(512)-AES(128) Serverless GWebCache-based peer dicovery procedure IRC based peer discovery system IRC embeded chat system Full text search of indexed documents (pdf, html, txt, doc etc) -> QUERY REFERENCE. Distributed/Decentralized Search engine HTTP tunneling ANts allow P2P communications through any kind of HTTP Proxy ANts allow P2P communications through any kind of NAT or traffic filtering system -ANts P2P realizes a third generation P2P ne t. It protects your privacy while you are connec ted and makes you not trackable, hiding your identity (ip) and crypting everyth ing you are sending/receiving from others. Fea tures Open Source Java implementation (GNU-GP L license) Multiple sources download Fog from Automatic resume partial files and source 's research over the net Search by hash. and structured query string Completely Object- Oriented routing protocol Point to Point secu red comunication : DH (512)- AES (128) EndPoint to secure EndPoint d comunication : DH (512)- AES (128) Serverless GWebCache-base d peer dicovery procedure IRC based peer discov ery system IRC chat system embeded Full text sea rch of indexed documents (pdf, html, txt, doc etc)-
Platform: | Size: 7742464 | Author: 谭朋柳 | Hits:

[BooksWSNsleach

Description: 基于无线传感器网络的一种安全路由协议 针对无线传感器网络(WSN)中路由协议的安全隐患,提出了一种安全的路由协议.该路由协 议在传统的定向扩散协议基础上增加安全机制,把整个路由过程分为路由建立和路由更新2个阶段,并对其安 全性进行分析.通过在路由建立阶段使用小区密钥和通信密钥,能为网络选择安全的路由;路由更新能在出 现路由故障时重新建立路由,进一步提高了无线传感器网络的路由安全性能. -Wireless sensor networks based on a secure routing protocol for wireless sensor network (WSN) routing protocol in the security risk, a routing protocol security. The routing protocol in the traditional orientation to increase the proliferation of agreements based on the security mechanism, the entire routing process is divided into routing updates and routing to establish two stages, and its security analysis. Routing through the cell-key establishment phase and communication using the key security options for network routing routing update to routing in the event of failure to re-establish routing to further improve the routing of wireless sensor network security .
Platform: | Size: 522240 | Author: 池尚琨 | Hits:

[Otherdynamic_en-route

Description: Secure routing in wireless sensor network wsn by dynamic key route
Platform: | Size: 268288 | Author: nes | Hits:

[OtherfuzzyBasedEnrouteFiltering

Description: Wireless sensor network secure routing protocol key route fuzzy algorithm
Platform: | Size: 312320 | Author: nes | Hits:

[Internet-Networksecure

Description: Secure routing protocol AODV
Platform: | Size: 4064256 | Author: refa3y | Hits:

[Industry researchSECURE_LEACH_ROUTING_PROTOCOL_BASED_ON_LOW-POWER_

Description: ABSTRACT In this paper we put forward a kind of secure LEACH routing protocol (SC-LEACH) based on low-power clusterhead selection algorithm. This protocol gets the total number of all nodes by their collaboration in selecting, to precisely calculate the present thresholds with which the cluster-heads is generated. Consequently, the probability of producing optimal cluster-heads in each round is the biggest,and the variance is the smallest, thus the network reaches its optimal energy cost. The adoption of pre-shared key pair dispatch improves the security of the routing effectively. Comparing with the LEACH protocol using symmetric keys dispatch, the simulation validates the effectiveness of SCLEACH.
Platform: | Size: 1276928 | Author: Amir | Hits:

[Program docSECURE-LEACH-ROUTING-PROTOCOL-BASED-ON-LOW-POWER-

Description: SECURE LEACH ROUTING PROTOCOL BASED ON LOW-POWER CLUSTER-HEAD
Platform: | Size: 1276928 | Author: samboy | Hits:

[Crack Hack10.1.1.165.8742

Description: Secure Antnet Routing Algorithm for Scalable Adhoc Networks Using Elliptic Curve Cryptography
Platform: | Size: 106496 | Author: dema | Hits:

[Internet-Networkmpolsr_NS2

Description: ns 2 simulator in secure routing protocols for mibile ad-hoc networks . it`s sample example explan how to begin with the simulation
Platform: | Size: 51200 | Author: yossef | Hits:

[Technology ManagementHuawei-S8500

Description: The Quidway® S8500 switch series (S8500 for short) is a new-generation 10G core routing switch platform developed by Huawei geared towards applications in enterprise campus network core layers and carriers IP metropolitan-area network (MAN) core or distribution layers for its intelligent, scalable architecture, as well as its converged, secure and reliable performance.-The Quidway® S8500 switch series (S8500 for short) is a new-generation 10G core routing switch platform developed by Huawei geared towards applications in enterprise campus network core layers and carriers IP metropolitan-area network (MAN) core or distribution layers for its intelligent, scalable architecture, as well as its converged, secure and reliable performance.
Platform: | Size: 1247232 | Author: imachol | Hits:

[Internet-Networkkey.tcl

Description: Bluetooth (BT) is presently the primary wireless technology for short range Personal Area Networks (PAN). Piconet is the basic unit of networking in BT that contains one master and from one to seven active salve devices. Piconets can be interconnected to form a Scatternet. Scatternet formation and routing are the important areas on which considerable research has been done so far. Security is another important issue for BT scatternets. BT specification provides security measures for Piconets but secure communication in a scatternet is an open problem. In our research we specifically consider routing security in BT scatternets. We describe a number of routing threats and then present an authenticated routing scheme which is based on Zone Routing Protocol. We evaluate the scheme through simulation and show that it effectively secures the route discovery process in BT scatternets.
Platform: | Size: 2048 | Author: varinder | Hits:

[OS program2011---Secure-Routing-Protocol-in-Mobile-Ad-Hoc-N

Description: 2011 - Secure Routing Protocol in Mobile Ad Hoc Networks – A Survey and Taxonomy
Platform: | Size: 92160 | Author: Mohamed Abdelshafy | Hits:

[Industry researchSAODV

Description: Secure Adhoc On Demand Distance Vector Routing
Platform: | Size: 81920 | Author: Adil | Hits:

[Program docSecure-On-Demand-Distance-Vector-Routing--in-Ad-H

Description: Secure On Demand Distance Vector Routing in Ad Hoc Networks-Secure On Demand Distance Vector Routing in Ad Hoc Networks
Platform: | Size: 328704 | Author: Diego | Hits:

[JSP/JavaDSRParser

Description: DSRParser.Java used for Secure Routing in Mobile Ad Hoc Networks
Platform: | Size: 1024 | Author: ashish | Hits:

[OS programaasr.tar

Description: authenticated anonymous secure routing for manet. this folder contain all the files for aasr routing protocol
Platform: | Size: 591872 | Author: sudhesh | Hits:

[Technology ManagementDSR

Description: Secure routing in wireless sensor networks: attacks and countermeasures
Platform: | Size: 13312 | Author: dalila | Hits:

[Documents[paperhub]10.1145_570681.570684

Description: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures
Platform: | Size: 187392 | Author: babamehrdad | Hits:
« 12 »

CodeBus www.codebus.net