Web
Education
Viewing 1-2 of 2 total results
Issues in WiFi Networks - 123seminarsonly.com
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Key Page 7 If the device sends a encrypted packet over WiFi using WEP in IEEE 802.11 secure architecture then the user insert a symmetric encryption key (the same as the one from
Detection of Obfuscation in Java Malware - ScienceDirect
Watermarking, tamper-proofing, and obfuscation - tools for software protection, In IEEE Transactions on Software Engineering, volume 28, pages 735–746, August 2002. 13. Florin BUZATU, “Methods for obfuscating Java programs†, Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 1, 2012 14.
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.