搜索资源列表
802.11Security
- Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required
EWSA
- 无线, WPA, GPU, 破解 ElcomSoft是一家俄罗斯软件公司,出品过众多密码破解软件,涉及 Office、SQL、PDF、EFS等等。推出的“Wireless Security Auditor 1.0”号称可以利用GPU的运算性能快速攻破无线网络WPA-PSK及WPA2-PSK密码,运算速度相比使用CPU可提高最多上百倍。 这款软件的工作方式很简单,就是利用词典去暴力破解无线AP上的WPA和WPA2密码,还支持字母大小写、数字替代、符号顺序变换、缩写、元音替换等 12种
LaptopBackupsource
- 热插拔设备现在是一个巨大威胁的IT安全。 In this article, we will try to develop a user-mode application to detect device change on the system, ie plug-in a USB drive, iPod, USB wireless network card, etc. The program can also disable any newly plugged devices.在本文中,我们将尝
RFID-Ripe-For-Informed-Debate
- RFID, the wireless technology that has helped millions of people around the world to protect their property and make their workplaces safer is now in danger of being viewed as a security risk. Ray Stanton examines the love-hate relationship b
TheapplicationofSMSinthedesignofportableembeddedmu
- 介绍一种具有短信息无线通讯功能的低功耗嵌入式多参数监护仪,基于ARM7核的32位低功耗微处理器作为系统控制核心,采用源码公开的嵌入式操作系统IxC/OS—II,通过低功耗的16位单片机MSP430完成数据采集,可实现心电、血氧、血压、体温信号的实时监测。系统采用西门子MC35i无线传输模块,实现生理参数以SMS方式无线传输,具有轻便节能、安全稳定等优点-Introduce a short message wireless communication function of low-power e
802.11Security
- O Reilly出版的有关802.11无线网络安全方面的权威著作,是研究无线网络安全技术人员重要的参考书籍-Reilly published on 802.11 wireless network security authority of the book is to study the wireless network security and technical personnel an important reference book
OReilly.802.11.Wireless.Networks.The.Definitive.G
- As a network administrator, architect, or security professional, you need to understand the capabilities, limitations, and risks associated with integrating wireless LAN technology into your current infrastructure. This practical guide provides a
RFID-security-system
- This project aimed to develop a wireless system to detect and allow only the authorized persons. The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The passive micro transponder tag collects p
OFDM_Security
- This a Simulink model that demonstrates an algorithm that applies wireless security on physical layer. The demonstration is based on 802.11a (simplified) and receiver is implemented on Xilinx Virtex 4 FPGA. The RAR file inlcudes 2 files: 1. Simul
Sensor-Network-Security-A-Survey
- 本文是一篇关于传感器网络安全的综述,详细地从各个层介绍了它的研究情况。-Wireless sensor networks(WSNs) use small nodes with constrained capabilities to sense,collect,and disseminate information in many types of applications.As sensor networks become wide-spread,security issues become
Cyber-Security
- Security Wireless security cyber security
MY-Project
- Wireless Security based Vehicle authentication System
1-Security-Issues-in-Wireless-Sensor-Networks---I
- Wireless sensor network in security
Wi-Foo---The-Secrets-of-Wireless-Hacking
- The definitive guide to penetrating and defending wireless networks. Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide cover
Cooperative-Cellular-Wireless-Networks
- This are kind of the books that focus on wireless networking that include, Wireless Ad Hoc, Security in Wireless Ad Hoc and Sensor Networks, Cellular and Wireless networking Technology, that I intent to share for improve and development each other fo
Wireless-Security
- Wireless Security and Cryptography Specifications and Implementations
Wireless-Security-Overview
- 无线网络安全方面综述性文献,PDF版,可以参考一下-Wireless Security Overview,for you reference.
Wireless-Security-Online
- Wireless Security Online Wireless Security Online
SAT A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks (2011)
- Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been exte
security
- Approach: NS-2 is an open source system that is developed using C++ and Tool Control Language TCL. Researchers can freely add new components to the system to server their own purposes. The latest version of NS-2 is version 2.28. Within this version,