搜索资源列表
security
- designing secure web-based application for windows 2
SECURE HASH STANDARD (sha)
- SHA 加密算法标准说明文件, 详细介绍相关的算法
WPS-document
- WiFi Protected Setup (WPS) 又叫Simple config。 是无线局域网领域推出的新协议,用来方便安全地建立 无线连接。该文档是Wifi联盟的官方协议规范,是实现 WPS协议的基础。-WiFi Protected Setup (WPS) also known as Simple config. The field of wireless local area network is a new protocol that is used to facilit
itvl20
- fault secure nano emory application
SCFS2.3
- The Numonyx™ Sector-based Compact File System (SCFS) is an embedded file system that manages Numonyx NAND flash memories, MultiMediaCard™ (MMC) devices and Secure Digital (SD) cards with the File Allocation Table (FAT) file system for
legic_en_using_contactless_smart_cards_for_secure
- Using Contactless Smart Cards for Secure Applications
10.1.1.86.3790.pdf
- A Survey on Secure Localization in Wireless Sensor Networks by Avinash Srinivasan and Jie Wu Florida Atlantic University, Boca Raton, FL, USA-A Survey on Secure Localization in Wireless Sensor Networks by Avinash Srinivasan and Jie Wu Florida Atl
V1.0
- SD卡协议,最通用的V1.0版本的协议,包括物理接口,文件系统,安全验证三部分,很全的资料。-SD card agreement, the most common V1.0 version of the protocol, including physical interfaces, file systems, secure authentication of three parts, it is full of information.
SECURE-LEACH-ROUTING-PROTOCOL-BASED-ON-LOW-POWER-
- SECURE LEACH ROUTING PROTOCOL BASED ON LOW-POWER CLUSTER-HEAD
Secure-Computer-and-Network-Systems-Modeling-Anal
- Secure Computer and Network Systems Modeling Analysis and Design
WirelessPSecurityP-PInformationPforPCIOs
- this document is related to wireless security ,give idea how to secure our network
A-SURVEY-OF-CHAOTIC-SECURE-COMMUNICATION
- A SURVEY OF CHAOTIC SECURE COMMUNICATION
SDV
- S-DV Secure Distance Vector Routing Protocols
provable-secure-neighbor-discovery-wireless.pdf.z
- provable secure neighbor discovery wirele-provable secure neighbor discovery wireless
Secure-On-Demand-Distance-Vector-Routing--in-Ad-H
- Secure On Demand Distance Vector Routing in Ad Hoc Networks-Secure On Demand Distance Vector Routing in Ad Hoc Networks
secure-data-communication-manet.pdf
- secure data communication manet
secure-message-transmission-manet.pdf
- secure message transmission manet
FIPS---Secure-Hash-Standard
- Document contains implementation details to implement Secure Hash Function for networking.
Chapter-24--Chaos-Based-Secure-Optical-Communicat
- Chaos-Based Secure Optical Communications Using Semiconductor Lasers
On-Secure-Wireless
- On Secure Wireless Communications for IoT Under Eavesdropper Collusion
