Welcome![Sign In][Sign Up]
Location:
Search - bluetooth Security

Search list

[Crack HackDES_one

Description: des加解密vc实现代码,参照蓝牙安全来实现的-vc des encryption codes, in the light of Bluetooth to achieve security
Platform: | Size: 20493 | Author: 宁炳武 | Hits:

[Crack HackDES_one

Description: des加解密vc实现代码,参照蓝牙安全来实现的-vc des encryption codes, in the light of Bluetooth to achieve security
Platform: | Size: 20480 | Author: 宁炳武 | Hits:

[Communication-MobileBluetooth_And_Its_Inherent_Security_Issues

Description: 蓝牙安全性分析报告 很很好的指导价值 牵涉到密码 鉴权等方面-Bluetooth security analysis report is very good value involves guiding password authentication, etc.
Platform: | Size: 166912 | Author: tiger | Hits:

[J2MEKickingButtWithMIDPandMSA

Description: J2ME开发的最新经典教程,包含了对于MIDP和MSA的框架介绍,并且对界面,图形,画布,游戏,3D,蓝牙,安全通信,数据记录,文件读写等各个方面进行了详细介绍,书中链接中包含有全部的示例代码-The development of the latest classic J2ME tutorial, including MIDP and MSA for the introduction of the framework, and on the interface, graphics, canvas, games, 3D, Bluetooth, security, communications, data records, documents and other various aspects of reading and writing a detailed introduction, the book link contains all the sample code
Platform: | Size: 2260992 | Author: libo | Hits:

[Windows Developblueteeth

Description: 蓝牙是一种新的短距离无线通信技术,鉴于蓝牙系统的移动性、普遍性与开放性,蓝牙安全性倍受关注。对蓝牙安全性进行分析.主要探讨了鉴权、加密和密钥管理等安全措施,并提出了目前存在的问题。- Bluetooth is a new short-range wireless communications technology, given the mobility of Bluetooth systems, the universality and openness, Bluetooth security has drawn greater attention. Bluetooth security analysis. Focused on authentication, encryption and key management and other safety measures, and to make the current problems.
Platform: | Size: 3149824 | Author: 贾明 | Hits:

[Software Engineeringbluetooth

Description: hardware implementation of bluetooth security using safer+ algorithm
Platform: | Size: 1607680 | Author: saurabh | Hits:

[Software EngineeringBluetooth_Security

Description: Bluetooth Developers guide for API and Security
Platform: | Size: 721920 | Author: moglee | Hits:

[SCMDasSeminor

Description: Bluetooth Time Division Duplex Analysis as a Polling System And Security
Platform: | Size: 155648 | Author: dasu | Hits:

[Internet-NetworkComputerNetworksAndrew.S.Tanenbaum

Description: 本书是国内外使用最为广泛的计算机网络经典教材。全书按照网络协议模型(物理层、数据链路层、介质访问控制子层、网络层、传输层和应用层),自下而上系统地介绍了计算机网络的基本原理,并给出了大量实例。在讲述各网络层的同时,还融合进了近年来迅速发展起来的各种网络技术,如Internet、SONET、ADSL、CDMA、WLAN和蓝牙等。另外,针对当前计算机网络的发展现状以及计算机安全的重要性,本书用了一整间的篇幅对计算机安全进行了深入讨论。   本书的适用对象很广泛。对于学习计算机网络课程的本科生以及研究生,本书都可以作为教材或教学参考书,每一章后面的大量练习题,可用于课程作业或者复习要点。对于从事网络研究、网络工程以及使用和管理网络的科研和工程技术人员,本书也是一本很有价值的参考读物。-This book is the most widely used at home and abroad of computer network classical textbook. Encyclopedia according to network protocol model (physical layer, data link layer, medium access control son layer, network layer, the transport layer and the application layer), bottom-up systematically introduced the basic principle of computer network is presented, and a great number of examples. In telling the network layer at the same time, still shirt-sleeve developed rapidly in recent years and all kinds of network technology, such as the Internet, SONET, ADSL, CDMA, WLAN and bluetooth etc. In addition, in view of the current situation and the development of computer network computer security, the importance of this book USES the entire length between to computer security carried on the thorough discussion. The book is a widely applicable object. To learn computer network course undergraduate and graduate students, this book can be used as a teaching material or reference book for teach
Platform: | Size: 11442176 | Author: 刘超 | Hits:

[SCMBluetooth-Final

Description: a presentation bluetooth security. very good read if u r intrested in working of bluetooth arch and security-a presentation on bluetooth security. very good read if u r intrested in working of bluetooth arch and security
Platform: | Size: 226304 | Author: bhargav | Hits:

[Program docSecurity_Architecture

Description: 蓝牙的安全架构规范。如果您对蓝牙中的安全问题感兴趣的那,那么这本书再适合不过了。-Bluetooth security architecture specification. If you are interested in the Bluetooth security problems in that, then this book is easy to do.
Platform: | Size: 229376 | Author: 111 | Hits:

[Other Embeded programRF-RS232

Description: 常用的近距离无线传输有很多种方式: 1)CC1100/NRF905 433MHz 无线收发模块; 2)NRF2401 2.4GHz 无线收发模块; 3)蓝牙模块; 4)Zigbee 系列无线模块; 以上1/2/3模块,一个大概要几十块钱,一套加起来要一百多块,4就更贵了,单个就要上百块钱 而常用的315M遥控模块就便宜很多了,收发一套淘宝上才卖8块钱。这种模块用途极其广泛,例如遥控开关/汽车/门禁/防盗等,大部分是配合2262/2272编解码芯片实现开关的功能。如果能够利用315M 模块实现数据传输,透明传输串口数据,那将是无线数据传输最廉价的方式。 -Commonly used short-range wireless transmission there are many ways: 1) CC1100/NRF905 433MHz wireless transceiver module 2) NRF2401 2.4GHz wireless transceiver module 3) Bluetooth module 4) Zigbee wireless module family 1/2/3 above modules, a probably hundreds of dollars, add up to a hundred pieces, 4 more expensive, single- One hundred dollars and must 315M remote control module used a lot cheaper, send and receive a set of Taobao and sold 8 Money. This module uses a very wide range, such as remote control switch/car/access control/security, etc., mostly with 2262/2272 codec chip switches. If you can use 315M module for data transmission Transmission, transparent serial data transmission, wireless data transmission that would be the cheapest way.
Platform: | Size: 215040 | Author: xu | Hits:

[Linux-UnixHH_eZine_N1

Description: spanish language security wireless WEP aircrack, windows linux ubuntu bluetooth visual basic mal ware tcpdump commands-spanish language security wireless WEP aircrack, windows linux ubuntu bluetooth visual basic mal ware tcpdump commands
Platform: | Size: 2338816 | Author: helenio | Hits:

[Internet-Networkkey.tcl

Description: Bluetooth (BT) is presently the primary wireless technology for short range Personal Area Networks (PAN). Piconet is the basic unit of networking in BT that contains one master and from one to seven active salve devices. Piconets can be interconnected to form a Scatternet. Scatternet formation and routing are the important areas on which considerable research has been done so far. Security is another important issue for BT scatternets. BT specification provides security measures for Piconets but secure communication in a scatternet is an open problem. In our research we specifically consider routing security in BT scatternets. We describe a number of routing threats and then present an authenticated routing scheme which is based on Zone Routing Protocol. We evaluate the scheme through simulation and show that it effectively secures the route discovery process in BT scatternets.
Platform: | Size: 2048 | Author: varinder | Hits:

[TCP/IP stacksocket20120418

Description: 演示Winsock网络编程中的完成端口模型,有助初学者加深对该模型原理的理解。 [AES] - AES快速算法和蓝牙设备中用的E0算法(用于加密)、E1算法、E2算法、E3算法(用于密钥管理和鉴权等)等 [TCPPacket.zip] - 此源码演示了如何通过原始套接字来模拟tcp包,对winsock网络编程及tcp/ip协议的学习 有帮助 [pGina.rar] - Windows下的登录替换程序,可以实现用自己的方法增强系统登录,例如使用智能卡、独立的认证系统等。 [Windows2000safe.rar] - Windows 2000 Server的加密机制 Windows 2000 Server的认证机制 Windows 2000 Server的审计机制 Windows 2000 Server的基本安全配置 [一种加密证书的实现.zip] - 一种加密证书的实现.zip-Demonstration Winsock network programming port model, will help beginners to deepen the understanding of the principles of the model. [AES]- AES Fast Algorithm for Bluetooth devices using the E0 algorithm (for encryption), the algorithm of the E1, E2 algorithm, the E3 algorithm (for key management and authentication, etc.) In TCPPacket.zip]- This source code demonstrates how to simulate the raw socket TCP packet winsock network programming and tcp/ip protocol learning [pGina.rar]- login replacement program under Windows, you can achieve with their own methods to enhance the system registry, such as the use of smart cards, and independent certification system. [Windows2000safe.rar]- Windows 2000 Server encryption mechanism, the Windows 2000 Server authentication mechanism in Windows 2000 Server auditing mechanism of Windows 2000 Server security configuration [An encryption certificate. The zip]- an encryption certificate. Zip
Platform: | Size: 86016 | Author: bishezhushou | Hits:

[OtherBluetooth_Security

Description: 蓝牙安全 全面介绍蓝牙安全技术及发展情况-Bluetooth Security is a book to teach how to make sure our bluetooth devices’s security。
Platform: | Size: 708608 | Author: 蟋蟀 | Hits:

[Software EngineeringBluetooth-security-analysis

Description: 关于蓝牙安全性能方面的知识,可以根据这个了解蓝牙应用过程中最基本的信息-About bluetooth safety performance is the knowledge of the respect, and may, according to the application of bluetooth in the process of understanding the basic information
Platform: | Size: 2048 | Author: zhouxiaolin | Hits:

[OtherBluetooth-Security

Description: This book is used for Bluetooth Security.
Platform: | Size: 850944 | Author: Joronz10 | Hits:

[OtherBLUETOOTH-SECURITY-THREATS-AND-SOLUTION---A-SURVE

Description: BLUETOOTH SECURITY THREATS AND SOLUTION - A SURVEY
Platform: | Size: 653312 | Author: Joronz10 | Hits:

[Embeded-SCM Develop8.security

Description: A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth IEEE 2013 PAPER
Platform: | Size: 520192 | Author: KPSS | Hits:
« 12 »

CodeBus www.codebus.net