您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. cryptopp 5.61

  2. Crypto++ Library is a free C++ class library of cryptographic schemes. Currently the library contains the following algorithms:algorithm type name authenticated encryption schemes GCM, CCM, EAX high speed stream ciphers Panama, Sosemanuk, Salsa20, X
  3. 所属分类:C++

    • 发布日期:2012-06-12
    • 文件大小:1048576
    • 提供者:hmlhmlb
  1. 网众无盘必开服务

  2. 网众无盘必开服务 文档 *Ati Hotkey Poller(网众无盘特有服务) *COM+Event system *cryptographic services—windows更新时用来确认Windows文件指纹的。 *DCOM Server Process Launcher
  3. 所属分类:网管软件

    • 发布日期:2012-08-05
    • 文件大小:946
    • 提供者:tang5030
  1. Internet Security Cryptographic Principles, Algorithms

  2. The material in this book presents the theory and practice on Internet security and its implementation through a rigorous, thorough and qualitative presentation in depth. The level of the book is designed to be suitable for senior and graduate stude
  3. 所属分类:专业指导

    • 发布日期:2012-09-11
    • 文件大小:4194304
    • 提供者:hcq0394
  1. Linux Shell Scripting Cookbook

  2. Table of Contents Preface 1 Chapter 1: Shell Something Out 7 Introduction 7 Printing in the terminal 9 Playing with variables and environment variables 12 Doing math calculations with the shell 17 Playing with file descr iptors and redirection 19 Ar
  3. 所属分类:Linux

    • 发布日期:2012-09-27
    • 文件大小:1048576
    • 提供者:shonghuanc6
  1. jce_policy

  2. the Unlimited Strength Java(TM) Cryptography Extension (JCE) Policy Files for the Java(TM) 2 Platform, Standard Edition Development Kit, v5.0. Due to import control restrictions, the version of JCE policy files that are bundled in the JDK(TM) 5.0 en
  3. 所属分类:Java

    • 发布日期:2012-10-15
    • 文件大小:9216
    • 提供者:laohanyang
  1. PKCS11(英文版)

  2. PKCS #11 Cryptographic Token Interface Standard
  3. 所属分类:Java

    • 发布日期:2008-07-21
    • 文件大小:307200
    • 提供者:flowerlulu
  1. Handbook of Applied Cryptography

  2. Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many application
  3. 所属分类:专业指导

    • 发布日期:2012-11-23
    • 文件大小:5242880
    • 提供者:fetag
  1. Hadoop 源代码

  2. Hadoop源代码。 This distribution includes cryptographic software. The country in which you currently reside may have restrictions on the import, possession, use, and/or re-export to another country, of encryption software. BEFORE using any encryption so
  3. 所属分类:其它

    • 发布日期:2012-11-29
    • 文件大小:62914560
    • 提供者:fuzhouqq
  1. VB+C++制作的加密解密工程

  2. Public-key cryptography refers to a cryptographic system requiring two separate keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One of these keys is published or public and
  3. 所属分类:系统安全

    • 发布日期:2012-12-01
    • 文件大小:30408704
    • 提供者:circle0513
  1. Understanding Cryptography (2010)

  2. Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedd
  3. 所属分类:C

    • 发布日期:2012-12-21
    • 文件大小:4194304
    • 提供者:henrya2
  1. hadoop-1.1.1.tar.gz

  2. hadoop-1.1.1.tar.gz For the latest information about Hadoop, please visit our website at: http://hadoop.apache.org/core/ and our wiki, at: http://wiki.apache.org/hadoop/ This distribution includes cryptographic software. The country in which you cur
  3. 所属分类:Java

    • 发布日期:2012-12-22
    • 文件大小:60817408
    • 提供者:feiniao_
  1. Data Protection Techniques

  2. Data Protection Techniques, Cryptographic Protocols and PKI Systems in Modern Computer Networks
  3. 所属分类:其它

    • 发布日期:2013-01-01
    • 文件大小:262144
    • 提供者:oapril1234
  1. ISO IEC 7816(1-13, 15)

  2. ISO/IEC 7816-1:1998 Identification cards — Integrated circuit(s) cards with contacts — Part 1: Physical characteristics". Iso.org. 2011-01-31. Retrieved 2011-11-12. ISO/IEC 7816-1:1998/Amd 1:2003 Maximum height of the IC contact surface". Iso.org. 2
  3. 所属分类:其它

    • 发布日期:2013-01-31
    • 文件大小:9437184
    • 提供者:champion_ly
  1. Beginning Cryptography With Java 带源码

  2. Beginning Cryptography with Java While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in
  3. 所属分类:系统安全

    • 发布日期:2013-03-05
    • 文件大小:3145728
    • 提供者:liruike
  1. IEEE1619标准-用于等长加密算法.pdf

  2. 简介:多说无益!仅供学习研究。 1619-2007 - IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4493450&url=http%3A%2F%2Fieeexplore.ieee.org%2Fstamp%2Fstamp.jsp%3Ftp%3D%26arnumbe
  3. 所属分类:其它

    • 发布日期:2013-04-28
    • 文件大小:271360
    • 提供者:sahusoft
  1. SM2椭圆曲线公钥密码算法

  2. SM2椭圆曲线公钥密码算法 Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves
  3. 所属分类:网络基础

    • 发布日期:2013-05-03
    • 文件大小:946176
    • 提供者:u010550822
  1. JDK5中文API参考(CHM)

  2. JDK5中文API参考(CHM) JavaTM 2 Platform Standard Edition 5.0 API 规范 Java 2 Platform 软件包 java.applet 提供创建 applet 所必需的类和 applet 用来与其 applet 上下文通信的类。 java.awt 包含用于创建用户界面和绘制图形图像的所有类。 java.awt.color 提供用于颜色空间的类。 java.awt.datatransfer 提供在应用程序之间和在应用程序内部传输数据的接口和类
  3. 所属分类:Java

    • 发布日期:2013-05-09
    • 文件大小:25165824
    • 提供者:asxsa
  1. CISCO 技术大集合

  2. CISCO 技术大集合 {适合你们的技术} 二、命令状态 1. router> 路由器处于用户命令状态,这时用户可以看路由器的连接状态,访问其它网络和主机,但不能看到和更改路由器的设置内容。 2. router# 在router>提示符下键入enable,路由器进入特权命令状态router#,这时不但可以执行所有的用户命令,还可以看到和更改路由器的设置内容。 3. router(config)# 在router#提示符下键入configure terminal,出现提示符route
  3. 所属分类:网络基础

    • 发布日期:2013-05-22
    • 文件大小:276480
    • 提供者:u010610376
  1. Beautiful Code(Edited by Andy Oram and Greg Wilson)

  2. Chapter 1, A Regular Expression Matcher, by Brian Kernighan, shows how deep insight into a language and a problem can lead to a concise and elegant solution. Chapter 2, Subversion’s Delta Editor: Interface As Ontology, by Karl Fogel, starts with a w
  3. 所属分类:C

    • 发布日期:2013-06-03
    • 文件大小:4194304
    • 提供者:goshirin
  1. DRNG技术文档

  2. Intel® Secure Key, previously code-named Bull Mountain Technology, is the Intel name for the Intel® 64 and IA-32 Architectures instruction RDRAND and its underlying Digital Random Number Generator (DRNG) hardware implementation. Among other things,
  3. 所属分类:硬件开发

    • 发布日期:2013-06-06
    • 文件大小:368640
    • 提供者:caokai65050113
« 1 2 3 4 56 7 8 9 10 ... 14 »