使熄灭 发表于 2025-3-26 22:55:15

1860-4862 lication layer, that approaches the topic more broadly than .This timely volume, .Wireless Network Security., provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medi

天空 发表于 2025-3-27 04:53:52

Secure Routing in Wireless Ad-Hoc Networksupt the network communication by launching attacks on the network or the routing protocol itself. In this chapter, we present several routing protocols for ad-hoc networks, the security issues related to routing, and securing routing protocols for mobile wireless ad-hoc networks.

JAMB 发表于 2025-3-27 07:29:47

http://reply.papertrans.cn/103/10291/1029004/1029004_33.png

Tartar 发表于 2025-3-27 13:02:14

Pre-Authentication and Authentication Models in Ad Hoc Networksc networks are discussed. The models can be implemented as a part of the proposed security framework and correspond to the wide range of ad hoc network applications. Advantages and disadvantages of the models are analyzed and suitable existing authentication and key exchange protocols are identified for each model.

单纯 发表于 2025-3-27 16:04:04

http://reply.papertrans.cn/103/10291/1029004/1029004_35.png

Panther 发表于 2025-3-27 19:49:25

http://reply.papertrans.cn/103/10291/1029004/1029004_36.png

Obituary 发表于 2025-3-28 00:51:58

http://reply.papertrans.cn/103/10291/1029004/1029004_37.png

jagged 发表于 2025-3-28 05:09:17

The Spread of Epidemics on Smartphonesemics spread. Extensive simulations in typical network topologies (smallworld network, power law graph, and Waxman network) have been performed to verify the ESS model and demonstrate the effectiveness and accuracy. The guidance to prevent the epidemics of smartphones is also given based on our theo

Pastry 发表于 2025-3-28 07:36:43

http://reply.papertrans.cn/103/10291/1029004/1029004_39.png

袋鼠 发表于 2025-3-28 12:33:53

http://reply.papertrans.cn/103/10291/1029004/1029004_40.png
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Wireless Network Security; Yang Xiao,Xuemin Sherman Shen,Ding-Zhu Du Book 2007 Springer-Verlag US 2007 Ad hoc networks.Bluetooth.Cellular