مالک است
فقط مشاهده
بارگذاری و ویرایش

Security

توسط ted T. 39,101 KB • 58 فایل

گزارش سوء استفاده
به صورت فایل زیپ دانلود کن
به حساب کاربری من اضافه شود
 
نام اندازه داده اضافه شد به حساب کاربری اضافه شود
an improved transport layer protocol for wireless sensor networks.pdf
Attack_Types.pdf
computer science,robotics,artificial intelligence,neural networks,it.pdf
detecting selective forwarding attacks in wireless sensor networks.pdf
e4019faa61ac9dfa254aef5a452a8a98.pdf
establishing pairwise keys in distributed_sensor networks_.pdf
impact of denial of serviceattacks on ad hoc networks.pdf
insens intrusion-tolerant routing for wireless sensor networks.pdf
ldc_tutorial.pdf
lincrypt.pdf
LinDifAnalyse.pdf
Linear Cryptanalysis Method for DES cypher.pdf
linear_chapter.pdf
prezent-samed bajric.pdf
random key predistribu- tion schemes for sensor networks.pdf
secure routing in wireless sensor networks_ attacks and countermeasures.pdf
sia- secure infor-mation aggregation in sensor networks.pdf
Using directional antennas to preventwormhole attacks.pdf

بررسي فايلهاي 28 office در فولدر Security 4shared من

We Use Cookies. 4shared uses cookies and other tracking technologies to understand where our visitors are coming from and improve your browsing experience on our Website. By using our Website, you consent to our use of cookies and other tracking technologies. Change my preferences
I Agree