搜索资源列表
2
- RFID系统的IEEE的文章,安全协议,认证- In this paper, we first propose a cryptographic authentication protocol which meets the privacy protection for tag bearers, and then a digital Codec for RFID tag is designed based on the protocol. The protocol w
Submarine
- 潜艇大战代码,是比较好的讲解了相互攻击游戏的编写原理-World War II submarine code, is better explained the principle of mutual attacks on the preparation of the game
Rootkit-in-Android
- 随着android手机的普及,针对android手机的攻击也逐渐增加,本论文着重研究了rootkit对android手机的攻击方式-With the popularity of android phone, android phone for attacks is also increasing, this paper focuses on study of a rootkit attack on the android phone
jafarnia
- Detection and Mitigation of Spoofing Attacks on a Vector-Based Tracking GPS Receiver
defeat-360-android-app
- 这是一份安卓 安全相关的资料.有文章和源码. 360作为国内专业的安全公司,在安全界的水平是有目共睹的,我们抛开它在经营与病毒防治上的一些极端措施,就其产品 技术性而言,是广大安全爱好者应该学习的。今天我与大家探讨下在Android平台上360手机卫士这款产品其本身的安全性, 并将自己研究时的一点小成果拿出来与大家分享。Android手持设备的私密性注定了这是一个敏感话题,在开始本文前,我 郑重声明:本文的宗旨是让大家看到Android平台的可能的攻击方式,仅供
TD2.3
- 基于LGame引擎的Android塔防游戏,Java源码下载,游戏的图片等资源用了炫光塔防的图片,Java代码中有丰富注释,便于学习理解。本款塔防游戏游戏一共有4种塔,每一种塔都可以升级,都有各自的攻击属性,也可以卖掉换钱。白色塔:射速快杀伤小;绿色塔:使敌人减速,杀伤小;红色塔:导弹能够跟踪目标。杀伤较大;蓝色塔:发出能量波,杀伤大。具体刺激程序请下载源码编译后可运行一下-Based LGame Android tower defense game engine, Java source co
Compressed_Sensing_based_Encryption
- On Known-Plaintext Attacks to a Compressed Sensing-based Encryption A Quantitative Analysis
Enhanced traffic classification for 3G
- Nowadays, billions of users are connected to the internet through the 3G mobile infrastructure offering a plethora of emerging services. This explosion is associated with a heavy and complex signaling among different network elements making them
3G-WLAN Convergence Vulnerability
- In this paper they present the vulnerability, threats and attacks for Third Generation (3G) networks converged with WLAN and propose the security model addressing the roaming and non-roaming security scenarios.
