เจ้าของ
แบบดูได้อย่างเดียว
การอัปโหลดและแก้ไข

Security

โดย ted T. 39,101 KB • 58 ไฟล์

แจ้งการใช้ในทางที่ผิด
ดาวน์โหลดเป็น Zip
เพิ่มลงในบัญชีผู้ใช้ของฉัน
 
1ef76a0fd08af0ba6e8d16d0e673be6a.pdf
3-DES.ppt
3-DES.ppt.pdf
4c0ac287bdff07f1a2536028f4f7464a.pdf
4ca.pdf
5bea01f17457a493afd236361d172e3f.pdf
6d025fd63d624b614609a818f2079aa4.pdf
10.1007-s10207-011-0127-4.pdf
34a1ac0f6c324d2b1b45849df75d6046.pdf
57.pdf
443.pdf
578de88b3e1adc935467e1f5b8dc1b94.pdf
1004.3164v1.pdf
1011.1529.pdf
1012.2516.pdf
1012.2516_2.pdf
1101.2759.pdf
1103.3378.pdf
1103.5589.pdf
20406f241c751f36b6bda653fe385536.pdf
352846dcd3d15aed8f0767c11dfef094.pdf
A distributed sinkhole detection method using cluster analysis.pdf
a key-management schemefor distributed sensor networks.ps
A novel agent-based approach to detect sinkhole attacks in wireless sensor networks.pdf
a novel node level security policy framework for wireless sensor networks.pdf
a pairwise key pre-distribution scheme for wireless sensor networks.pdf
a ranging based scheme for detecting the wormhole attack in wireless sensor networks.pdf
a secure alternate path routing in sensor networks.pdf
a secure alternate path routing in sensornetworks.pdf
A trust evaluation framework indistributed networks_ Vulnerability analysis and defense against attacks.pdf

ตรวจสอบ 30 office ไฟล์ที่แฟ้ม 4shared ของฉัน Security

We Use Cookies. 4shared uses cookies and other tracking technologies to understand where our visitors are coming from and improve your browsing experience on our Website. By using our Website, you consent to our use of cookies and other tracking technologies. Change my preferences
I Agree