切换至中文 Over 1 million code package, 10 million code file free download
  • [MultiPlatform] SecurityEngineeringExplained.rar about security of software
    Category: software engineering Upload User:jzhc1118 Size:298K
  • [PDF] RFID.rar Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing.pdf Security of an RFID Protocol for Supply Chains.pdf Server Impersonation Attacks on RFID Protocols.pdf Untraceable RFID authentication protocols_ Revision of EC- ...
    Category: Other eBooks Upload User:szygbnlb Size:2307K
  • [Java/JSP] serg.rar security engineer research group
    Category: Java Develop Upload User:iel_jane Size:5069K
  • [PDF] Security_in_WSN.rar Document for design security protocol in wireless sensor network
    Category: Other eBooks Upload User:semyoo2003 Size:5770K
  • [Others] RFID_Security_(2006).rar focused on the technical security aspects of using RFID, specifically the physical and data layers
    Category: RFID Upload User:fsnrehr Size:4226K
  • [C#(.net)] Programming.NET_Security.rar O Reilly- Programming .NET Security with source code (chm) in English.
    Category: .net Upload User:yxb0921 Size:2897K
  • [Others] WirelessSecurityKnowItAll.rar ... networks in use today? How does each one of them work and how do they differ from each other? The aim of this chapter is to answer these questions so as to establish a context in which wireless security can be studied in the following chapters.
    Category: Windows Develop Upload User:wdk007 Size:4347K
  • [C/C++] Security_programming.rar Security System LAN line based
    Category: software engineering Upload User:baisengs Size:20K
  • [PDF] s01-2.rar ... the IEEE 802.16e standard is introduced and their security vulnerabilities are analyzed. Possible solutions for secure handover in ... verified using Scyther, a specialized model checker for security protocols. These solutions showed a few drawbacks in ...
    Category: Windows Develop Upload User:kssb888 Size:612K
  • [PDF] 2006issc.zip Security in wireless sensor networks is currently provided through symmetric key cryptography. Although the low computational complexity involved in private key algorithms is advantageous, session keys must be embedded in the sensor nodes before the ...
    Category: Other eBooks Upload User:bjso2008 Size:175K