a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto PROTOCOLS require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.
The goal of this thesis is the development of traffic engineering rules for cellular packet
radio networks based on GPRS and EDGE. They are based on traffic models for typical
mobile applications. Load generators, representing these traffic models, are developed
and integrated into a simulation environment with the prototypical implementation of
the EGPRS PROTOCOLS and models for the radio channel, which were also developed in
the framework of this thesis. With this simulation tool a comprehensive performance
evaluation is carried out that leads to the traffic engineering rules.
本書是英文版,但內容非常不錯,本書目錄如下:
Table of Contents
SIP—Understanding the Session Initiation Protocol, Second Edition
Foreword to the First Edition
Preface to - the Second Edition
Preface to - the First Edition
Chapter 1 - SIP and the Internet
Chapter 2 - Introduction to SIP
Chapter 3 - SIP Clients and Servers
Chapter 4 - SIP Request Messages
Chapter 5 - SIP Response Messages
Chapter 6 - SIP Header Fields
Chapter 7 - Related PROTOCOLS
Chapter 8 - Comparison to H.323
Chapter 9 - Wireless and 3GPP
Chapter 10 - Call Flow Examples
Chapter 11 - Future Directions
Appendix A - Changes in the SIP Specification from RFC 2543 to RFC 3261
Aodv for NS-2. A mobile ad-hoc network (MANET) is a kind of wireless ad-hoc network, and is a self-configuring
network of mobile routers connected wirelessly. MANET may operate in a standalone fashion, or may
be connected to the larger Internet. Many routing PROTOCOLS have been developed for MANETs over
the past few years. This project evaluated three specific MANET routing PROTOCOLS which are Ad-hoc
On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Dynamic MANET Ondemand
routing protocol (DYMO) to better understand the major characteristics of these routing
PROTOCOLS. Different performance aspects were investigated in this project including packet delivery
ratio, routing overhead, throughput and average end-to-end delay.
openssl源碼
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS) PROTOCOLS as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation.
大名鼎鼎的嵌入式操作系統vxworks的完整的源代碼,支持多種體系結構的嵌入式處理器,如arm,x86,i960,mc68k,mips,ppc,sparc等,包含完整的實時多任務處理及網絡tcpip,dhcp,rip等協議,tffs文件系統,以及各種硬件驅動程序如usb--All the source code of Famous vxwork Embedded operating system , it supports the Embedded processor of many kinds of systems architecture, such as arm,x86,I9600,mc68k,Mips,ppc,sparc etc, it includes entire Real-Time & multi_tasks processing and some network PROTOCOLS of tcpip,dhcp,rip, tfffs file system,and various kinds of hardware drivers (eg usb) etc
The Universal Radio Hacker (URH) is a software for investigating unknown wireless PROTOCOLS. Features include
* __hardware interfaces__ for common Software Defined Radios
* __easy demodulation__ of signals
* __assigning participants__ to keep overview of your data
* __customizable decodings__ to crack even sophisticated encodings like CC1101 data whitening
* __assign labels__ to reveal the logic of the protocol
* __fuzzing component__ to find security leaks
* __modulation support__ to inject the data back into the system
* __simulation environment__ to perform stateful attacks
Mobile telecommunications emerged as a technological marvel allowing for access to
personal and other services, devices, computation and communication, in any place and
at any time through effortless plug and play. This brilliant idea became possible as the
result of new technologies developed in the areas of computers and communications that
were made available and accessible to the user.
Coverage of routing techniques in various wired and wireless networks is the unique
proposition of this book. Routing PROTOCOLS and algorithms are the brains of any network.
The selection of topics in this book is clear: we attempt to explain routing in its entirety,
starting from fundamental concepts, then moving through routing on the Internet, and
finally cutting across the recent‐day cellular, ad hoc, and wireless networks.