We first analyze the adversary types, security threats and relating security requirements based on the structure and features of wireless Ad hoc networks.

  • 首先从无线Ad hoc网络的结构、特点入手,分析了这种网络存在的攻击者类型、可能受到的安全威胁和相关的一些安全需求;
目录 查词历史