找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Wireless Network Security; Theories and Applica Lei Chen,Jiahuang Ji,Zihong Zhang Book 2013 Higher Education Press,Beijing and Springer-Ver

[复制链接]
楼主: 补给线
发表于 2025-3-25 06:52:25 | 显示全部楼层
Security in RFID Networks and Communications,ter, we study the security aspects of RFID networks and communications. We begin by introducing the main security threats, followed by a discussion of various security mechanisms used to protect RFID networks. We conclude by studying the security mechanism of an actual large scale RFID deployment.
发表于 2025-3-25 07:37:20 | 显示全部楼层
Security in Bluetooth Networks and Communications,of Bluetooth security goals leads to a description of the different security models available. We conclude with a discussion of the more prevalent attacks on Bluetooth security and the most widely used procedures for mitigating such attacks.
发表于 2025-3-25 13:58:30 | 显示全部楼层
ons discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in
发表于 2025-3-25 19:10:50 | 显示全部楼层
Chao Yang,Guofei Gurovides connections for readers with other branches and hintThis book treats ensembles of Young diagrams originating from group-theoretical contexts and investigates what statistical properties are observed there in a large-scale limit. The focus is mainly on analyzing the interesting phenomenon tha
发表于 2025-3-25 22:33:41 | 显示全部楼层
Lei Chen,Peter Cooper,Qingzhong Liurst hailed as a great advance in science, “The Limits to Growth” was subsequently rejected and demonized. However, with many national economies now at risk and global peak oil apparently a reality, the methods, scenarios, and predictions of “The Limits to Growth” are in great need of reappraisal. In
发表于 2025-3-26 00:38:32 | 显示全部楼层
Weidong YangAdmins powerful far beyond that of mere mortals.Written by D.Reveals and illustrates the awesome power and flexibility of the command line, and the design and usage philosophies that support those traits. This understanding of how to extract the most from the Linux command line can help you become a
发表于 2025-3-26 06:39:40 | 显示全部楼层
发表于 2025-3-26 08:47:03 | 显示全部楼层
Lei Chen,Narasimha Shashidhar,Shengli Yuan,Ming YangMarkus Thiel 2011
发表于 2025-3-26 12:42:54 | 显示全部楼层
发表于 2025-3-26 18:10:27 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-15 02:18
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表