-
-
[分享]Mobile Security
-
发表于: 2009-11-22 05:05 5096
-
A security protocol for mobile agents based upon the cooperation of sedentary agents.pdf (483.2 KB)
Authentication in a layered security approach for mobile ad hoc networks.pdf (278.5 KB)
Enhancing security for the mobile workforce.pdf (52.6 KB)
Platform independent overall security architecture in multi-processor system-on-chip integrated .pdf (917.4 KB)
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing.pdf (341.4 KB)
Security in Mobile IPv6--A survey.pdf (338.4 KB)
Security of mobile payments.pdf (109.3 KB)
The security risks of AJAX-web 2.0 applications.pdf (209.6 KB)
Web security.pdf (239.0 KB)
Web service layer security (WSLS).pdf (161.2 KB)
Web voting, security and cryptography.pdf (230.0 KB)
The practical application of a process for eliciting and designing security in web service syste.rar (1.13 MB)
Authentication in a layered security approach for mobile ad hoc networks.pdf (278.5 KB)
Enhancing security for the mobile workforce.pdf (52.6 KB)
Platform independent overall security architecture in multi-processor system-on-chip integrated .pdf (917.4 KB)
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing.pdf (341.4 KB)
Security in Mobile IPv6--A survey.pdf (338.4 KB)
Security of mobile payments.pdf (109.3 KB)
The security risks of AJAX-web 2.0 applications.pdf (209.6 KB)
Web security.pdf (239.0 KB)
Web service layer security (WSLS).pdf (161.2 KB)
Web voting, security and cryptography.pdf (230.0 KB)
The practical application of a process for eliciting and designing security in web service syste.rar (1.13 MB)
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)
赞赏
他的文章
- [转帖][Cado-nfs-discuss] 795-bit factoring and discrete logarithms (RSA-240 于2019年12月2日被破解) 19498
- [转帖]How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits 8162
- [推荐]RSA-220 has 220 decimal digits (729 bits), and was factored 6895
- [推荐]RSA-210 has been factored. 11179
- Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks... 8923
谁下载
谁下载
谁下载
谁下载
谁下载
谁下载
谁下载
谁下载
谁下载
谁下载
看原图
赞赏
雪币:
留言: