-
-
[分享]Mobile Security
-
2009-11-22 05:05 4792
-
A security protocol for mobile agents based upon the cooperation of sedentary agents.pdf (483.2 KB)
Authentication in a layered security approach for mobile ad hoc networks.pdf (278.5 KB)
Enhancing security for the mobile workforce.pdf (52.6 KB)
Platform independent overall security architecture in multi-processor system-on-chip integrated .pdf (917.4 KB)
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing.pdf (341.4 KB)
Security in Mobile IPv6--A survey.pdf (338.4 KB)
Security of mobile payments.pdf (109.3 KB)
The security risks of AJAX-web 2.0 applications.pdf (209.6 KB)
Web security.pdf (239.0 KB)
Web service layer security (WSLS).pdf (161.2 KB)
Web voting, security and cryptography.pdf (230.0 KB)
The practical application of a process for eliciting and designing security in web service syste.rar (1.13 MB)
Authentication in a layered security approach for mobile ad hoc networks.pdf (278.5 KB)
Enhancing security for the mobile workforce.pdf (52.6 KB)
Platform independent overall security architecture in multi-processor system-on-chip integrated .pdf (917.4 KB)
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing.pdf (341.4 KB)
Security in Mobile IPv6--A survey.pdf (338.4 KB)
Security of mobile payments.pdf (109.3 KB)
The security risks of AJAX-web 2.0 applications.pdf (209.6 KB)
Web security.pdf (239.0 KB)
Web service layer security (WSLS).pdf (161.2 KB)
Web voting, security and cryptography.pdf (230.0 KB)
The practical application of a process for eliciting and designing security in web service syste.rar (1.13 MB)
[培训]《安卓高级研修班(网课)》月薪三万计划,掌 握调试、分析还原ollvm、vmp的方法,定制art虚拟机自动化脱壳的方法
赞赏
他的文章
谁下载
谁下载
谁下载
谁下载
谁下载
谁下载
谁下载
谁下载
谁下载
谁下载
看原图