搜索资源列表
可信网络连接关键技术研究与实现
- With the accelerate implementation of information and the rapid development of e-commerce and e-government, the network security is of great significance. Now people are more concerned about how to ensure working at a trusted network environment. In
Understanding Deep Packet Inspection for SCADA Security
- Understanding Deep Packet Inspection for SCADA Security
SUMMARY OF ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS
- This summary is based on the work of February, which is focused on reading papers about Ad hoc network and getting familiar with the domain before the research of the Master Subject “Multi-path Routing Protocol for Mobile Ad Hoc Network”. Mobile Ad h
Analysis and Design of Security for Next Generation 4G Cellular Networks
- Analysis and Design of Security for Next Generation 4G Cellular Networks
Dynamical behavior and application in Josephson Junction coupled by memristor
- With the burst of a Wanna decryptor [1] in the middle of 2017, secure communication within a network [2] has again triggered the considerable attention. Meanwhile, many feasible methods have been proposed to enhance the data security and it is also