搜索资源列表
可信网络连接关键技术研究与实现
- With the accelerate implementation of information and the rapid development of e-commerce and e-government, the network security is of great significance. Now people are more concerned about how to ensure working at a trusted network environment. In
SUMMARY OF ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS
- This summary is based on the work of February, which is focused on reading papers about Ad hoc network and getting familiar with the domain before the research of the Master Subject “Multi-path Routing Protocol for Mobile Ad Hoc Network”. Mobile Ad h
Functional Documents for Computer Systems
- Although software documentation standards often go into great detail about the format of documents, describing such details as paragraph numbering and section headings, they fail to give precise descr iptions of the information to be contained in the
Dynamical behavior and application in Josephson Junction coupled by memristor
- With the burst of a Wanna decryptor [1] in the middle of 2017, secure communication within a network [2] has again triggered the considerable attention. Meanwhile, many feasible methods have been proposed to enhance the data security and it is also
