概观 发表于 2025-3-23 11:42:51

Security in Bluetooth Networks and Communications, its technical specifications. It continues with a discussion of the various network structures that can be developed through Bluetooth. A discussion of Bluetooth security goals leads to a description of the different security models available. We conclude with a discussion of the more prevalent att

为宠爱 发表于 2025-3-23 17:13:56

http://reply.papertrans.cn/103/10291/1029005/1029005_12.png

Omnipotent 发表于 2025-3-23 19:08:50

Security in Wireless Sensor Networks,rtant to guarantee high security of the deployed network in order to de- fend against attacks from adversaries. In this chapter, we survey the recent progress in the security issues for wireless sensor networks, mainly focusing on the key distribution and management schemes and some high layer pro-

中止 发表于 2025-3-24 01:59:59

http://reply.papertrans.cn/103/10291/1029005/1029005_14.png

ELUC 发表于 2025-3-24 05:53:38

http://reply.papertrans.cn/103/10291/1029005/1029005_15.png

人工制品 发表于 2025-3-24 08:08:49

Security in RFID Networks and Communications,. One of the most critical issues facing RFID networks is that of security. Unlike conventional networks, RFID networks are characterized by the use of computationally weak RFID tags. These tags come with even more stringent resource constraints than the sensors used in sensor networks. In this chap

Consensus 发表于 2025-3-24 14:42:17

http://reply.papertrans.cn/103/10291/1029005/1029005_17.png

保守 发表于 2025-3-24 18:09:47

http://reply.papertrans.cn/103/10291/1029005/1029005_18.png

CHOKE 发表于 2025-3-24 21:51:17

Security in Wireless Sensor Networks,tocols such as secure routing, location privacy protection and secure data aggregation. Representative works on each topic are described in detail and both of their strongpoint and drawbacks are discussed, based on which we give some direction for future research.

conquer 发表于 2025-3-25 01:43:53

http://reply.papertrans.cn/103/10291/1029005/1029005_20.png
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Wireless Network Security; Theories and Applica Lei Chen,Jiahuang Ji,Zihong Zhang Book 2013 Higher Education Press,Beijing and Springer-Ver