CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 搜索资源 - ad hoc network security

搜索资源列表

  1. hipl.1.0.1

    0下载:
  2. Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced s
  3. 所属分类:Linux/Unix编程

    • 发布日期:2008-10-13
    • 文件大小:2.83mb
    • 提供者:nihao
  1. A_self-organized_authentication_architecture_in_mo

    0下载:
  2. 网络安全是妨碍ad-hoc无线网络广泛应用的障碍之一。在许多安全问题中,鉴别是最基本的问题。我们提出一个新的体系叫做安全覆盖网络(SON)用于全分布式网络的识别。NPC可达性和模拟结果是我们相信我们的体系的有效性。-Network security is hampered ad-hoc wireless networks One of the obstacles to wider application. In many security issues, the identification o
  3. 所属分类:Network Security

    • 发布日期:2017-04-24
    • 文件大小:133.62kb
    • 提供者:leilei
  1. adhoc_tutorial_PPT

    0下载:
  2. 详细介绍无线多跳adhoc网络的PPT.包括网络中的MAC层和路由层介绍、常用的协议算法,存在的问题,TCP与UDP协议性能比较,安全问题等,有助于了解Ad hoc网络的概况 -Details of the wireless multi-hop adhoc networks PPT. Including the network MAC layer and routing layer descr iption of the protocol algorithm used, problems,
  3. 所属分类:Development Research

    • 发布日期:2017-05-16
    • 文件大小:4.34mb
    • 提供者:lily
  1. 132

    0下载:
  2. Reliable communication is mission critical to Emergency and Rescue operations. MANET technology allowing communication where fixed infrastructure is not available is very attractive for this setting. Emergency and Rescue operations may take place
  3. 所属分类:Network Security

    • 发布日期:2017-04-17
    • 文件大小:69.02kb
    • 提供者:Rishi
  1. 20040615

    0下载:
  2. 针对基于IBC的无线Ad hoc网络中的密钥管理存在的安全威胁,本文在分析所有节点均可以移动的无线网络组通信安全需求的基础上提出了分层的分布式组密钥管理框架。-For the IBC-based wireless Ad hoc network security threats exist in key management, this paper analysis of all nodes can be mobile wireless network group communication ba
  3. 所属分类:Crypt_Decrypt algrithms

    • 发布日期:2017-04-03
    • 文件大小:303.33kb
    • 提供者:张伟
  1. RoutingSecurity

    0下载:
  2. propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the r
  3. 所属分类:Development Research

    • 发布日期:2017-04-01
    • 文件大小:52.29kb
    • 提供者:zipzap
  1. C08-Network_Protocols

    0下载:
  2. Mobile Communications: Network Protocols/Mobile IP Data transfer, Encapsulation, Security IPv6,Micro mobility support, DHCP Ad-hoc networks, Routing protocols
  3. 所属分类:Communication-Mobile

    • 发布日期:2017-05-19
    • 文件大小:4.93mb
    • 提供者:dash
  1. -100172720765

    0下载:
  2. 无线传感器网络安全技术,对于安全协议的学习有所帮助-Wireless sensor network security technology, security protocol for help in learning
  3. 所属分类:SCM

    • 发布日期:2017-04-05
    • 文件大小:328.9kb
    • 提供者:南希儿
  1. Security-Issues-in-Ad-Hoc-Networks

    0下载:
  2. Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and is gradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with each othe
  3. 所属分类:Windows Develop

    • 发布日期:2017-03-26
    • 文件大小:197.4kb
    • 提供者:badraac
  1. security1

    0下载:
  2. Security protocol for mobile ad hoc network and sensor network.
  3. 所属分类:Windows Mobile

    • 发布日期:2017-04-13
    • 文件大小:1.91kb
    • 提供者:amrit
  1. Simulation.pdf.tar

    0下载:
  2. Simulation of New Security Elements in an Ad Hoc Network
  3. 所属分类:Windows Develop

    • 发布日期:2017-04-05
    • 文件大小:998.43kb
    • 提供者:rachid
  1. wireless1

    0下载:
  2. security of routing in ad hoc mobile network
  3. 所属分类:Linux Network

    • 发布日期:2017-04-05
    • 文件大小:2.14kb
    • 提供者:tenna
  1. ADHOCnetworkblackhole

    2下载:
  2. ADHOC网络黑洞攻击仿真,黑洞攻击是一种典型的针对无线自组织(Ad Hoc)网络的攻击,也是Ad Hoc网络面临的主要安全威胁之一。为实现对黑洞攻击的仿真研究,基于黑洞攻击原理,在AODV路由协议的基础上,利用OPNET网络仿真平台,建立了Ad Hoc网络黑洞攻击仿真模型,搭建了不同攻击强度下的仿真场景。仿真结果表明:该模型能够较为准确地模拟各种环境下黑洞攻击对Ad Hoc网络性能的影响,可为Ad Hoc网络安全防范等问题的研究提供重要参考。 www.1-fun.com 推荐-Simul
  3. 所属分类:Internet/网络编程

    • 发布日期:2013-04-30
    • 文件大小:354.67kb
    • 提供者:无名
  1. function-TDSR

    0下载:
  2. Ad-hoc networks refer to temporary networks which form for special purposes. Mobile ad-hoc networks (MANETs) are networks which use no network assisting element for routing, but every node has the role of router and actively participates in data
  3. 所属分类:LabView

    • 发布日期:2017-12-05
    • 文件大小:12.38kb
    • 提供者:shadi
  1. Security-Issues-in-Ad-Hoc-Networks

    0下载:
  2. Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and isgradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with eachother in a
  3. 所属分类:Windows Develop

    • 发布日期:2017-04-02
    • 文件大小:197.5kb
    • 提供者:movePr
  1. adhoc-security

    0下载:
  2. 提出了一种基于信任模型的机会路由协议,有效地保证了自组网网路的安全正常通信。弥补了机会路由协议中的安全隐患问题-This paper proposes a trust model based routing protocols, effectively guarantee the safety of AD hoc network normal communication.To make up for the safety problems in routing protocol opportun
  3. 所属分类:Project Design

    • 发布日期:2017-05-01
    • 文件大小:897.03kb
    • 提供者:zxyxiaoyuer
  1. CHAPTER-1

    0下载:
  2. In our project we are going to provide security in mobile Ad hoc network in ibriCT staff wireless. So we are going to learn how to use Threshold cryptography and how strong this method is. Also we will configure how mobile phones are communicated.
  3. 所属分类:Project Manage

    • 发布日期:2017-04-17
    • 文件大小:18.7kb
    • 提供者:maryam
  1. SUMMARY OF ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

    0下载:
  2. This summary is based on the work of February, which is focused on reading papers about Ad hoc network and getting familiar with the domain before the research of the Master Subject “Multi-path Routing Protocol for Mobile Ad Hoc Network”. Mobile Ad h
  3. 所属分类:报告论文

    • 发布日期:2015-11-15
    • 文件大小:1.2mb
    • 提供者:nabilmesbahi
  1. icnsv7.pdf

    0下载:
  2. Security of uav ad hoc network
  3. 所属分类:Development Research

    • 发布日期:2017-05-06
    • 文件大小:701.78kb
    • 提供者:Maxa
  1. security

    0下载:
  2. Approach: NS-2 is an open source system that is developed using C++ and Tool Control Language TCL. Researchers can freely add new components to the system to server their own purposes. The latest version of NS-2 is version 2.28. Within this version,
  3. 所属分类:其他

    • 发布日期:2018-04-20
    • 文件大小:2kb
    • 提供者:bvc
« 12 »
搜珍网 www.dssz.com