Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - security wireless
Search - security wireless - List
WAP无线应用协议.包括WAE Wireless Application Enviromnent 无线应用环境, WAP Wireless Application Protocol 无线应用协议,WDP Wireless Datagrm Protocol 无线数据报协议,WML Wireless Markup Language 无线标记语言,WSP Wireless Session Protocol 无线会话协议,WTA Wireless Telephony Application 无线电话应用,WTLS Wireless Transport Layer Security 无线传输层安全,WTP Wireless Transaction Protocol 无线事务协议-Wireless Application Protocol. WAE including Wireless Application En viromnent wireless application environment, WAP Wireless Application Protocol Wireless Application Protocol. WDP Wireless Datagrm Protocol wireless data protocol, WML Wireless Markup Language Wireless Markup Language. WSP Wireless Session Protocol wireless conversation agreement WTA Wireless Telephony Application mobile applications, WTLS Wireless Transport Layer Security Wireless Transport Layer Security CHAIRMAN, WTP Wireless Transaction Protocol Wireless Services Agreement
Update : 2008-10-13 Size : 15.99mb Publisher : 马弘历

Wireless Security is a vast topic and any attempt to address all issues in a single book is a daunting task. It is almost impossible to explain each and every security algorithm that is used in wireless security in detail in a single volume.
Update : 2010-12-07 Size : 2.48mb Publisher : yeahelton@hotmail.com

Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.-Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in Theor y and practice of wireless security, dispelling some of the myths along the way. In do ing so, they provide you with the technical grounding r equired to think about how the rest of the book ap plies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--ba sed systems. you ll want this book beside you every step of the way.
Update : 2025-02-17 Size : 816kb Publisher :

无线智能安防系统的方案,可以给大家做安防的人有一些设计经验的分享。-Wireless Intelligent Security Systems program, you can give us security people do have some design experience-sharing.
Update : 2025-02-17 Size : 241kb Publisher : 吕海安

DL : 0
无线传感器网络QoS保证技术 无线传感器网络数据融合技术 无线传感器网络安全机制-Wireless sensor network to guarantee QoS technology wireless sensor network data fusion technology wireless sensor network security mechanisms
Update : 2025-02-17 Size : 138kb Publisher : coco

无线安全系列的一本好书,国外经典教材,值得一看-Wireless security series of a good book, a classic foreign materials, worth a visit
Update : 2025-02-17 Size : 4.3mb Publisher : cuiyanzhe

DL : 0
关于无线传感器网络安全性问题的研究进展和相关讨论的论文。-On wireless sensor network security research progress and related discussion papers.
Update : 2025-02-17 Size : 125kb Publisher : 苏可

it is Security and Quality of Service in Ad Hoc Wireless Networks Mar 2008
Update : 2025-02-17 Size : 2.39mb Publisher : vamsikrishna

Wireless Sensor Network SEcurity demo
Update : 2025-02-17 Size : 329kb Publisher : jax

详细介绍无线多跳adhoc网络的PPT.包括网络中的MAC层和路由层介绍、常用的协议算法,存在的问题,TCP与UDP协议性能比较,安全问题等,有助于了解Ad hoc网络的概况 -Details of the wireless multi-hop adhoc networks PPT. Including the network MAC layer and routing layer description of the protocol algorithm used, problems, TCP and UDP protocol performance comparison, the security problems, and so help to understand the profile of Ad hoc Networks
Update : 2025-02-17 Size : 4.34mb Publisher : lily

As a network administrator, architect, or security professional, you need to understand the capabilities, limitations, and risks associated with integrating wireless LAN technology into your current infrastructure. This practical guide provides all the information necessary to analyze and deploy wireless networks with confidence. It?s the only source that offers a full spectrum view of 802.11, from the minute details of the specification, to deployment, monitoring, and troubleshooting.
Update : 2025-02-17 Size : 7.45mb Publisher : MEONGHUN LEE

This project aimed to develop a wireless system to detect and allow only the authorized persons. The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The passive micro transponder tag collects power from the 125 KHz magnetic field generated by the base station, gathers information about the Tag ID and sends this information to the base station. The base station receives, decodes and checks the information available in its Database and Manchester code was used to send those information. The system performed as desired with a 10cm diameter antenna attached to the transponder. The Base Station is built by using the Popular 8051 family Microcontroller. It gets the tag ID and if the tag ID is stored in its memory then the microcontroller will allow the person inside. RFID Reader Module, are also called as interrogators.
Update : 2025-02-17 Size : 109kb Publisher : Binu

本文是一篇关于传感器网络安全的综述,详细地从各个层介绍了它的研究情况。-Wireless sensor networks(WSNs) use small nodes with constrained capabilities to sense,collect,and disseminate information in many types of applications.As sensor networks become wide-spread,security issues become a central concern, especially in mission-criticaltasks.In this paper,we identify the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analys is ?rst.Then we give a holistic overview of security issues.These issues are divided into seven categories:cryptography,keymanage- ment,attack detections and preventions,securer outing,secure location security,secure data fusion,and other security issues. Along the way we analyze thead vantages and disadvantages of current secure schemes in each category.Inaddition,we also summarize the techniques and methods used in these categories,and point out the open research issues and directions in each area.
Update : 2025-02-17 Size : 340kb Publisher : 马宁

Security Wireless security cyber security
Update : 2025-02-17 Size : 164kb Publisher : hp

Wireless sensor network in security
Update : 2025-02-17 Size : 77kb Publisher : atul

Zigbee无线传感器网络在安全监测系统中的应用-Zigbee wireless sensor network security monitoring system
Update : 2025-02-17 Size : 350kb Publisher : desk

This are kind of the books that focus on wireless networking that include, Wireless Ad Hoc, Security in Wireless Ad Hoc and Sensor Networks, Cellular and Wireless networking Technology, that I intent to share for improve and development each other for the best new in the world. I hope for the next future will have something new more for the modern technology. Thank you-This are kind of the books that focus on wireless networking that include, Wireless Ad Hoc, Security in Wireless Ad Hoc and Sensor Networks, Cellular and Wireless networking Technology, that I intent to share for improve and development each other for the best new in the world. I hope for the next future will have something new more for the modern technology. Thank you!!!
Update : 2025-02-17 Size : 8.38mb Publisher : sokun

this one of security protocol in wireless sensor network
Update : 2025-02-17 Size : 384kb Publisher : asautm

一种安全性较强的无线网络设置,基于TPLink-A strong security wireless network settings, based TPLink
Update : 2025-02-17 Size : 634kb Publisher : xihuag

DL : 0
Approach: NS-2 is an open source system that is developed using C++ and Tool Control Language TCL. Researchers can freely add new components to the system to server their own purposes. The latest version of NS-2 is version 2.28. Within this version, most of the standard protocols supported. You can find protocol from media access layer protocols such as CSMA/CD up to application protocols as FTP and HTTP. For routing protocols, there are unicast and multicast routing protocols for wire network and DSR, DSDV, AODV for wireless ad-hoc networks. Most of these protocols were developed by researchers and adopted into standard version of NS-2. In order to experiment security features for network, we need to add security functions into NS-2. Of course for specific experiments there are specific requirements. The purpose of this project is only to illustrate a way to add security functions into NS-2 Our approach is to build a new protocol at network layer
Update : 2025-02-17 Size : 2kb Publisher : bvc
« 12 3 4 5 6 7 8 9 10 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.