- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
A novel security routing using identity-based lightweight digital signature in WMSNs
This paper presents a lightweight digital signature-based routing message and node authentication solution for wireless multimedia sensor networks (WMSNs). The lightweight geographical security routing protocol (ECDSA-TPGF) is proposed on the basis of improving the original two-phase greedy geographical forwarding protocol (TPGF), in which we have added the solution Elliptic curve cryptography (ECC) and cyclic redundancy check (CRC) to create...
8 p umt 21/02/2024 6 0
Từ khóa: Lightweight digital signature-based routing message, Novel security routing, Node authentication solution, Wireless multimedia sensor network, Cyclic redundancy check
Ebook Wireless network security: Part 2
Ebook Wireless network security: Part 2 includes contents: Chapter 8: Intrusion detection in cellular mobile networks; Chapter 9: The spread of epidemics on smartphones; Chapter 10: Cross-domain mobility-adaptive authentication; Chapter 11: AAA architecture and authentication for wireless LAN roaming; Chapter 12: An experimental study on security protocols in WLANs; Chapter 13: Security issues in wireless sensor networks used in clinical...
236 p umt 23/09/2023 34 0
Từ khóa: Ebook Wireless network security, Wireless network security, Cellular mobile networks, Cross-domain mobility-adaptive authentication, AAA architecture, Security protocols in WLANs
Ebook Wireless network security: Part 1
Ebook Wireless network security: Part 1 includes contents: Chapter 1: High performance elliptic curve cryptographic co-processor; Chapter 2: An adaptive encryption protocol in mobile computing; Chapter 3: Pre-authentication and authentication models in ad hoc networks; Chapter 4: Promoting identity-based key management in wireless ad hoc networks; Chapter 5: A survey of attacks and countermeasures in mobile ad hoc networks; Chapter 6: Secure...
186 p umt 23/09/2023 36 0
Từ khóa: Ebook Wireless network security, Wireless network security, Cryptographic co-processor, Encryption protocol, Mobile computing, Authentication models in ad hoc networks
Ebook Wireless security handbook: Part 2
Ebook Wireless security handbook: Part 2 includes contents: Chapter 9 the wireless deployment process, chapter 10 wireless access points, chapter 11 wireless end devices, chapter 12 wireless lan security, chapter 13 breaking wireless security, chapter 14 wireless security policy, chapter 15 wireless security architectures, chapter 16 wireless tools, appendix a review question answers.
215 p umt 23/09/2023 31 0
Từ khóa: Wireless security handbook, Wireless security, The wireless deployment process, Wireless access points, Wireless lan security, Wireless security policy
Ebook Wireless security handbook: Part 1
Ebook Wireless security handbook: Part 1 includes contents: Chapter 1 wireless network overview, chapter 2 risks and threats of wireless, chapter 3 the legality of computer crime, chapter 4 wireless physical layer technologies, chapter 5 wireless management frames, chapter 6 wireless local and personal area networks, chapter 7 wide area wireless technologies, chapter 8 wireless antenna theory.
138 p umt 23/09/2023 36 0
Từ khóa: Wireless security handbook, Wireless security, Wireless network, The legality of computer crime, Wireless physical layer technologies, Personal area networks
Đăng nhập
Bộ sưu tập nổi bật