For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be
In this paper,a model with two mutual learning neural networks named Tree Parity Machine(TPM) is firstly introduced,as well as its cryptographic property of wei
This paper provides a critical review of energy entropy theory in Mobile Ad Hoc Networks (MANETs) and proposes an Energy Entropy on Ad Hoc On-demand Distance Ve