派博傳思國(guó)際中心

標(biāo)題: Titlebook: Wireless Network Security; Theories and Applica Lei Chen,Jiahuang Ji,Zihong Zhang Book 2013 Higher Education Press,Beijing and Springer-Ver [打印本頁(yè)]

作者: 補(bǔ)給線    時(shí)間: 2025-3-21 18:47
書目名稱Wireless Network Security影響因子(影響力)




書目名稱Wireless Network Security影響因子(影響力)學(xué)科排名




書目名稱Wireless Network Security網(wǎng)絡(luò)公開度




書目名稱Wireless Network Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Wireless Network Security被引頻次




書目名稱Wireless Network Security被引頻次學(xué)科排名




書目名稱Wireless Network Security年度引用




書目名稱Wireless Network Security年度引用學(xué)科排名




書目名稱Wireless Network Security讀者反饋




書目名稱Wireless Network Security讀者反饋學(xué)科排名





作者: 野蠻    時(shí)間: 2025-3-21 20:34
https://doi.org/10.1007/978-3-642-36511-9Bluetooth; HEP; MANETs; Network Security; Sensor Network; WLAN; Wireless Network Security
作者: Aprope    時(shí)間: 2025-3-22 03:25

作者: 萬(wàn)花筒    時(shí)間: 2025-3-22 07:06
Higher Education Press,Beijing and Springer-Verlag Berlin Heidelberg 2013
作者: Eeg332    時(shí)間: 2025-3-22 10:38
Security in Wireless Local Area Networks,ecurity protocols such as WEP, WPA, WPA2, and WAPI. We also survey security issues of the WLAN access points such as rogue access points and evil twin attacks. Finally, we overview other security mechanisms that can be used to enhance WLAN security, including Wireless Firewalls, Wireless VPN, and Wireless IDS.
作者: 柳樹;枯黃    時(shí)間: 2025-3-22 16:03
Security in Wireless Mesh Networks, wireless mesh networks. The treatment of these subjects is based on both theoretical analysis and practical application. In addition, cuttingedge wireless mesh network research projects and commercial products are discussed to provide technical insights for researchers and practitioners.
作者: MOCK    時(shí)間: 2025-3-22 18:34

作者: NAG    時(shí)間: 2025-3-23 00:54

作者: liaison    時(shí)間: 2025-3-23 02:28

作者: Fabric    時(shí)間: 2025-3-23 09:26

作者: 概觀    時(shí)間: 2025-3-23 11:42
Security in Bluetooth Networks and Communications, its technical specifications. It continues with a discussion of the various network structures that can be developed through Bluetooth. A discussion of Bluetooth security goals leads to a description of the different security models available. We conclude with a discussion of the more prevalent att
作者: 為寵愛    時(shí)間: 2025-3-23 17:13

作者: Omnipotent    時(shí)間: 2025-3-23 19:08
Security in Wireless Sensor Networks,rtant to guarantee high security of the deployed network in order to de- fend against attacks from adversaries. In this chapter, we survey the recent progress in the security issues for wireless sensor networks, mainly focusing on the key distribution and management schemes and some high layer pro-
作者: 中止    時(shí)間: 2025-3-24 01:59

作者: ELUC    時(shí)間: 2025-3-24 05:53

作者: 人工制品    時(shí)間: 2025-3-24 08:08
Security in RFID Networks and Communications,. One of the most critical issues facing RFID networks is that of security. Unlike conventional networks, RFID networks are characterized by the use of computationally weak RFID tags. These tags come with even more stringent resource constraints than the sensors used in sensor networks. In this chap
作者: Consensus    時(shí)間: 2025-3-24 14:42

作者: 保守    時(shí)間: 2025-3-24 18:09

作者: CHOKE    時(shí)間: 2025-3-24 21:51
Security in Wireless Sensor Networks,tocols such as secure routing, location privacy protection and secure data aggregation. Representative works on each topic are described in detail and both of their strongpoint and drawbacks are discussed, based on which we give some direction for future research.
作者: conquer    時(shí)間: 2025-3-25 01:43

作者: 散布    時(shí)間: 2025-3-25 06:52
Security in RFID Networks and Communications,ter, we study the security aspects of RFID networks and communications. We begin by introducing the main security threats, followed by a discussion of various security mechanisms used to protect RFID networks. We conclude by studying the security mechanism of an actual large scale RFID deployment.
作者: 膽小懦夫    時(shí)間: 2025-3-25 07:37
Security in Bluetooth Networks and Communications,of Bluetooth security goals leads to a description of the different security models available. We conclude with a discussion of the more prevalent attacks on Bluetooth security and the most widely used procedures for mitigating such attacks.
作者: Exposure    時(shí)間: 2025-3-25 13:58
ons discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in
作者: Middle-Ear    時(shí)間: 2025-3-25 19:10
Chao Yang,Guofei Gurovides connections for readers with other branches and hintThis book treats ensembles of Young diagrams originating from group-theoretical contexts and investigates what statistical properties are observed there in a large-scale limit. The focus is mainly on analyzing the interesting phenomenon tha
作者: 原諒    時(shí)間: 2025-3-25 22:33
Lei Chen,Peter Cooper,Qingzhong Liurst hailed as a great advance in science, “The Limits to Growth” was subsequently rejected and demonized. However, with many national economies now at risk and global peak oil apparently a reality, the methods, scenarios, and predictions of “The Limits to Growth” are in great need of reappraisal. In
作者: Permanent    時(shí)間: 2025-3-26 00:38
Weidong YangAdmins powerful far beyond that of mere mortals.Written by D.Reveals and illustrates the awesome power and flexibility of the command line, and the design and usage philosophies that support those traits. This understanding of how to extract the most from the Linux command line can help you become a
作者: Exuberance    時(shí)間: 2025-3-26 06:39

作者: Dissonance    時(shí)間: 2025-3-26 08:47
Lei Chen,Narasimha Shashidhar,Shengli Yuan,Ming YangMarkus Thiel 2011
作者: 縫紉    時(shí)間: 2025-3-26 12:42

作者: 有雜色    時(shí)間: 2025-3-26 18:10

作者: enterprise    時(shí)間: 2025-3-27 00:22
Security in Vehicular Ad Hoc Networks (VANETs),national and international projects devoted to VANETs, such as, the Research and Innovative Technology Administration (RITA) in the United States, the Car-to-Car Communication Consortium (C2C-CC) in European, and the Advanced Safety Vehicle Program (ASV) in Japan.
作者: BROOK    時(shí)間: 2025-3-27 03:28
Book 2013etworks, Network Security and Information Security, Information Privacy and Assurance, as well as Digital Forensics..Lei Chen is an Assistant Professor at Sam Houston State University, USA; Jiahuang Ji is an Associate Professor at Sam Houston State University, USA; Zihong Zhang is a Sr. software eng
作者: 珠寶    時(shí)間: 2025-3-27 09:19
Chao Yang,Guofei Gustination here is a clear description of the asymptotic behavior of rescaled profiles of Young diagrams in the Plancherel ensemble from both static and dynamic points of view.978-4-431-56485-0978-4-431-56487-4Series ISSN 2197-1757 Series E-ISSN 2197-1765
作者: cruise    時(shí)間: 2025-3-27 10:55

作者: 地名詞典    時(shí)間: 2025-3-27 16:05

作者: 杠桿    時(shí)間: 2025-3-27 18:40
Weidong Yangtical aspects of that philosophy with real-world experiments you can perform. Inspired by David’s real mentors, and dedicated to them, .The Linux Philosophy for System Administrators. is a mentor to SysAdmins e978-1-4842-3729-8978-1-4842-3730-4
作者: Affection    時(shí)間: 2025-3-28 00:17
Lei Chen,Peter Cooper,Qingzhong Liupolitical mechanisms that led to its rejection. Bardi also addresses the all-important question of whether the methods and approaches of “The Limits to Growth” can contribute ?to an understanding of what happened to the global economy in the Great Recession and where we are headed from there..
作者: 粗糙濫制    時(shí)間: 2025-3-28 05:47

作者: 生銹    時(shí)間: 2025-3-28 06:56

作者: 項(xiàng)目    時(shí)間: 2025-3-28 12:42
zed the spectacle of continuity over any substantive pause and rethinking, rendering the universities’ responses formalistic and superficial. The chapter attributes these responses to the dominance of structures underscoring judgement, comparison and display of universities’ performance, prevalent i
作者: Intersect    時(shí)間: 2025-3-28 17:10

作者: panorama    時(shí)間: 2025-3-28 18:52

作者: 懶惰民族    時(shí)間: 2025-3-29 01:03
Managing Manufacturing Operations: Analysis and DiscussionTeachers’ Manual
作者: 毗鄰    時(shí)間: 2025-3-29 04:41

作者: Compassionate    時(shí)間: 2025-3-29 10:52





歡迎光臨 派博傳思國(guó)際中心 (http://www.yitongpaimai.cn/) Powered by Discuz! X3.5
洛隆县| 呼图壁县| 开化县| 永泰县| 沐川县| 西平县| 龙游县| 长兴县| 扶风县| 海安县| 阿坝| 长丰县| 巴东县| 麦盖提县| 大埔县| 呼和浩特市| 合作市| 仁怀市| 彰化县| 江津市| 平利县| 城步| 凉城县| 竹溪县| 宜川县| 东乡| 盐源县| 子长县| 苗栗县| 周至县| 玛纳斯县| 天水市| 博湖县| 陵川县| 政和县| 郧西县| 和林格尔县| 大田县| 梨树县| 铅山县| 安福县|