-
1“... for the mobile agent based networks. As far as mobile agent security is concerned, we devise a new...”
Get full text
Others -
2“... to face the variance in the former information security risk. When the network administrator carries...”
Get full text
Others -
3“...碩士 === 大葉大學 === 資訊管理學系碩士班 === 95 === Mobile ad hoc networks (MANETs) are a collection of wireless...”
Get full text
Others -
4A Study on Vulnerabilities of Information Security Protection Mechanism on SNMPv3 Network Management“... security. In such a way, it provides useful suggestions for network managers. ...”
Get full text
Others -
5“... that the transmission of packets in mobile virtual private networks can be more secure. Also, we can develop further a...”
Get full text
Others -
6by Yong-Yuan Deng, Chin-Ling Chen, Woei-Jiunn Tsaur, Yung-Wen Tang, Jung-Hsuan ChenSubjects: “...sensor network...”
Published 2017-12-01
Get full text
Article -
7“... 802.11x wireless local area networks (WLAN) such that organizational security can be ensured. Campus...”
Get full text
Others -
8“..., with emerging network security issues, the aforementioned access control mechanism is inadequate. Therefore...”
Get full text
Others -
9“... the members of community look-after network condense the common consensus, and achieve purpose of sharing...”
Get full text
Others -
10“... on the Internet employ the certificate-based public key cryptosystem to solve their related security issues...”
Get full text
Others -
11“... and more serious networks security problems, the existing access control mechanisms are insufficient...”
Get full text
Others -
12“... networked information resources by employing a variety of limited rules and security policy. Therefore...”
Get full text
Others -
13“...碩士 === 大葉大學 === 資訊管理學系碩士班 === 96 === In recent years, wireless ad hoc networks is an increasingly...”
Get full text
Others -
14“... and communication face information security and confidentiality issues with comprehensive networks, including...”
Get full text
Others -
15“... the security of network communications in vehicular ad hoc network. To do so, we use the password-based...”
Get full text
Others -
16“... of a architecture of secure filter, and further develop a hierarchical cluster networks dynamic key...”
Get full text
Others -
17“...碩士 === 大葉大學 === 資訊管理學系碩士班 === 96 === Mobile ad hoc networks have many unstable characteristics...”
Get full text
Others -
18“... the requirement to provide group access control in mobile ad hoc networks (MANETs). Due to the dynamic membership...”
Get full text
Others -
19“... security issues are mostly related to the popularity and the convenience of networks. In order to reduce...”
Get full text
Others -
20“..., it is very important and urgent to protect and strengthen the network security of campus information systems...”
Get full text
Others