没有合适的资源?快使用搜索试试~
我知道了~
文库首页
开发技术
其它
security of WSN
security of WSN
security
需积分: 0
1 下载量
143 浏览量
2011-01-01
16:29:07
上传
评论
收藏
3.71MB
PDF
举报
温馨提示
立即下载
wireless sensor network security
资源推荐
资源评论
security
浏览:7
security
Security of Self-Organizing Networks MANET, WSN, WMN, VANET.pdf
浏览:122
5星 · 资源好评率100%
More and more computing devices are coming into existence every day, which may vary in ...this goal is a challenging problem from both the security and the usability or user interaction points of view
Development of Safety Monitoring System Based on WSN
浏览:149
security of chemical laboratories and dangerous goods warehouse, an indoor safety detection device and a handheld terminal are developed by use of MSP430 MCU, temperature and humidity sensor, ...
Double Guarantee for Security Localization in Wireless Sensor Network
浏览:190
we propose a novel WSN security localization algorithm: Double Guarantee Security Sensor Localization, which can enhance the reliability and security of message packets via message source ...
201107241731_18-58-1-PB_WSN_
浏览:61
The inclusion of wireless communicationtechnology also incurs various types of security threats.However like any other system security is one of theimportant issues in any WSN application. The intent
WSN
浏览:35
参考链接: : 运行界面截图:
WSN-topology_WSN_
浏览:82
Geometric Routing Protocol for WSN (2-D)
1_security(1).one
浏览:149
1_security(1).one
xuewang2010_WSN_
浏览:155
Wsn target tracking covrage mobile energy
WSN-Experiment
浏览:102
WSN-ExperimentWSN-ExperimentWSN-Experiment
casola2011_WSN_
浏览:161
A widely distributedmonitoring system is typically characterizedby different security requirements that should be addressedby means of specific security protocols and architectures.Indeed security ..
无线传感器网络/WSN/Zigbee白皮书
浏览:77
5星 · 资源好评率100%
The fast progress of research on energy efficiency, networking, data management and security in wireless sensor networks, and the need to compare with the solutions adopted in the standards motivates
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
浏览:56
User authentication is a basic security requirement during the deployment of the wireless sensor network (WSN), because it may operate in a rather hostile environment, such as a military battlefield..
How to Secure a Wireless Sensor Network
浏览:177
The security of wireless sensor networks (WSNs) is a complex issue. While security research of WSNs is progressing at a tremendous pace, and many security techniques have been proposed, no ...
Spotting Outliers in Large Distributed Datasets using
浏览:149
integration may cause violation of data security and leakage of sensitive information. In this work we propose cell density based mechanism for outlier detection (CDOD) in large distributed databases.
WSN.zip_WSN_bin2str_zip
浏览:179
convert binary to string
WSN tinyos 2
浏览:107
关于无线传感器网络的教程 还有tinyos已经相应的nesc语言
file2_WSN_
浏览:79
localization algorithms for wireless sensor networks WSN
file1_WSN_
浏览:58
very useful localization algorithms for wireless sensor networks
wsn_WSN_
浏览:5
WSN代码可运行,供初学者学习参考。代码可运行,有注释
Geographic Wormhole Detection in Wireless Sensor Networks
浏览:6
<span xss=removed>Wireless<span> </span><span>s</span><span>e</span><span>ns</span><span>... Security is vital in WSNs and is one of the big
物联网 (IoT) 安全和隐私的未来威胁:调查-研究论文
浏览:30
现在一天的网络安全是世界上最大的担忧和威胁之一。 物联网是一项日益普及的新兴技术,数十亿设备互连到一个广泛的网络平台,这造成了隐私和安全问题。 个人和企业通过互联网使用大量设备,这一策略使系统容易受到...
物联网(BCoT):区块链和物联网技术的融合-研究论文
浏览:106
区块链和物联网 (IoT) 被认为是两大颠覆性新兴技术。 然而,它们都在一定程度上受到先天的技术限制。 物联网需要加强其安全特性,而区块链由于广泛使用加密机制而固有地拥有这些特性,而区块链(以相反的方式)需要...
security.one
浏览:100
security.one
评论
收藏
内容反馈
立即下载
资源评论
资源反馈
评论星级较低,若资源使用遇到问题可联系上传者,3个工作日内问题未解决可申请退款~
联系上传者
评论
gjhandgjb
粉丝: 0
资源:
1
私信
上传资源 快速赚钱
我的内容管理
展开
我的资源
快来上传第一个资源
我的收益
登录查看自己的收益
我的积分
登录查看自己的积分
我的C币
登录后查看C币余额
我的收藏
我的下载
下载帮助
前往需求广场,查看用户热搜
最新资源
咖啡店各年订单.json
CUDA规约求和.cu
多batchCUFFT.txt
机械设计自动贴标工站sw22非常好的设计图纸100%好用.zip
基于stm32的交通灯,源码原理图
设置要链接的库文件的名称TARGET-LINK-LIBRARIES.txt
get-uuid.tar.gz
cmake 生成静态库和动态库.txt
093ssm-vue药源购物网站.zip(可运行源码+数据库文件+文档)
vue项目小结 - 滚动监听钩子、时间求解、加载、路由、pinia、异步请求、界面展示、数据架构技巧等核心功能总结
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功