欢迎来到天天文库
浏览记录
ID:39361747
大小:1.75 MB
页数:79页
时间:2019-07-01
《yyperformance assessment of secure manet routing protocols in malicious environment》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、PerformanceassessmentofSecureMANETroutingprotocolsinaMaliciousEnvironmentOctober2011UniversityId:10532StudentId:LY2009017SecurityLevel:NormalHUNANUNIVERSITYPerformanceassessmentofsecureMANETroutingprotocolsinmaliciousenvironmentMASTER’STHESISByFodayKonkoKamaraCollegeMajorRese
2、archFieldSupervisor:InformationScienceandEngineering:ComputerApplications:ComputerNetworking:ProfessorWangDongSubmissionDateDefenseDate::15thOctober201128thOctober2011DefensecommitteeChairman:ProfessorLiaoHunanUniversity二Octor2011PerformanceassessmentofSecureMANETroutingproto
3、colsinaMaliciousEnvironmentPerformanceassessmentofsecureMANETroutingprotocolsinmaliciousenvironmentByFodayKonkoKamaraDiplomainComputerHardwareEngineering(AfricaInformationTechnologyHoldingsLimited,FreetownSierraLeone)2008AThesisSubmittedinpartialfulfillmentoftheRequirementsfo
4、rtheDegreeofMasterofEngineeringinComputerScienceandTechnologyInThegraduateSchoolofHunanUniversityChangshaChinaSupervisorProfessorWangDongOctober2011Copyright2011,FodayKonkoKamaraHunanUniversity三Octor2011PerformanceassessmentofSecureMANETroutingprotocolsinaMaliciousEnvironment
5、HunanUniversity四Octor2011PerformanceassessmentofSecureMANETroutingprotocolsinaMaliciousEnvironmentHUNANUNIVERSITYDECLARATIONI,FodayKonkoKamaraherebydeclarethattheworkpresentedinthisMaster’sthesistitled“PerformanceassessmentofsecureMANETroutingprotocolsinmaliciousenvironment”i
6、smyoriginalworkandhasnotbeenpresentedelsewhereforanyacademicqualification.Wherereferenceshavebeenusedfrombooks,publishedpapers,reportsandwebsites,itisfullyacknowledgedinaccordancewiththestandardreferencingpracticesofthediscipline.Student’ssignature:Date:CopyrightStatementPerm
7、issionisherewithgrantedtoHunanUniversitytocirculateandreproducefornon-commercialpurposes,atitsdiscretion,thisthesisupontherequestofindividualsorinstitutions.Theauthordoesnotreserveotherpublicationrightsandthethesisnorextensiveextractsfromitbeprintedorotherwisereproducewithout
8、theauthor’swrittenpermissionThisthesisbelongsto:1.Secure,andthispowe
此文档下载收益归作者所有