您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Cryptographic Hash Functions and the NIST SHA-3 Competition

  2. This breakthrough has resulted in a urry of research, resulting in new constructions and a growing body of foundational research.
  3. 所属分类:网络安全

    • 发布日期:2018-04-14
    • 文件大小:162816
    • 提供者:weixin_41656797
  1. python3.6.5参考手册 chm

  2. Python参考手册,官方正式版参考手册,chm版。以下摘取部分内容:Navigation index modules | next | Python » 3.6.5 Documentation » Python Documentation contents What’s New in Python What’s New In Python 3.6 Summary – Release highlights New Features PEP 498: Formatted string liter
  3. 所属分类:Python

    • 发布日期:2018-04-15
    • 文件大小:7340032
    • 提供者:ly_564963745
  1. Hardening TLS using ATECC508A

  2. TLS is a cryptographic protocol designed to provide secure communication over an insecure infrastructure. This means that, if this protocol is properly deployed, you can open a communication channel to an arbitrary service on the internet and be rea
  3. 所属分类:硬件开发

    • 发布日期:2018-06-18
    • 文件大小:5242880
    • 提供者:zxchqh
  1. Digital Forensics with Kali Linux pdf

  2. Learn the skills you need to take advantage of Kali Linux for digital forensics investigations using this comprehensive guide Key Features Master powerful Kali Linux tools for digital investigation and analysis Perform evidence acquisition, preserva
  3. 所属分类:系统安全

    • 发布日期:2018-06-19
    • 文件大小:33554432
    • 提供者:sinat_41581062
  1. Beginning Blockchain--2018

  2. What You’ll Learn Get a detailed look at how cryptocurrencies work Understand the core technical components of Blockchain Build a secured Blockchain solution from cryptographic primitives Discover how to use different Blockchain platforms and their
  3. 所属分类:其它

    • 发布日期:2018-07-08
    • 文件大小:8388608
    • 提供者:kxg1005
  1. 电梯门禁读卡器(普通型出口读卡器).doc

  2. 一、产品简介 Product Descr iption 采用ARM内核,工业级别,CAN总线,多重保护读写器的数据安全,一卡一密。可与多奥停车管理/门禁/考勤/智能通道/消费/在线巡更等智能一卡通 The data in the multi-protection reader are secure.Non-contact IC card is in line with international standards,and logical cryptographic oerations are
  3. 所属分类:其它

    • 发布日期:2018-07-28
    • 文件大小:101376
    • 提供者:a13393867561
  1. org.bouncycastle jar包

  2. The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.6.
  3. 所属分类:Java

    • 发布日期:2018-08-13
    • 文件大小:1048576
    • 提供者:lx11573
  1. Future of Blockchain

  2. The speed and scale of this change are not abating. New developments are still being introduced and applied – and this creates a significant dividend for Australia and New Zealand. A report published by Deloitte Access Economics in 2015 estimated th
  3. 所属分类:Dapp

    • 发布日期:2018-08-24
    • 文件大小:1048576
    • 提供者:chen1527027
  1. UnderstandingPki-Concepts Standards DeploymentAndConsiderations

  2. 关于PKI的系统讲解,PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which a
  3. 所属分类:其它

    • 发布日期:2018-01-23
    • 文件大小:3145728
    • 提供者:demonjordan
  1. zoc_7.17.3_xclient.info.dmg

  2. Secure Shell (SSH) is a cryptographic protocol that securely transports data over an unsecured network. As the name suggests, its main purpose is to establish a secure connection to a remote shell account. The SSH client is the software, which the u
  3. 所属分类:互联网

    • 发布日期:2018-02-02
    • 文件大小:4194304
    • 提供者:fuyuanju0739
  1. Java 11 / JDK 11 下载

  2. 摘自:http://openjdk.java.net/projects/jdk/11/ 181: Nest-Based Access Control(基于嵌套的访问控制) 309: Dynamic Class-File Constants(动态的类文件常量) 315: Improve Aarch64 Intrinsics(改进 Aarch64 Intrinsics) 318: Epsilon: A No-Op Garbage Collector(Epsilon 垃圾回收器,又被称为"No-Op
  3. 所属分类:Java

    • 发布日期:2018-09-26
    • 文件大小:156237824
    • 提供者:qq_26465035
  1. RSA公司的PKCS系列标准

  2. RSA公司的PKCS(Public Key Cryptography Standards)系列标准。 官方网站的相关页面和链接好像已经失效。经过精心查找和整理,这可能是目前能收集到的最全的版本,包括如下版本: PKCS #1 v2.2: RSA Cryptography Standard PKCS #1 v2.1: RSA Cryptography Standard PKCS #1 v2.0: RSA Cryptography Standard PKCS #1 v2.0 Amendment 1
  3. 所属分类:网络安全

    • 发布日期:2018-09-27
    • 文件大小:8388608
    • 提供者:mariozq
  1. Obfuscator 2.0.8

  2. This asset obfuscates your code to make it harder for bad guys to reverse engineer your projects. Specifically designed for Unity, it seamlessly links in with its build process. The top priority of this package is to work straight out of the box wit
  3. 所属分类:Unity3D

    • 发布日期:2018-10-22
    • 文件大小:840704
    • 提供者:qq_41191951
  1. proverif用户文档

  2. proverif用户文档,ProVerif is an automatic cryptographic protocol verifier, in the formal model (so called Dolev-Yao model). This protocol verifier is based on a representation of the protocol by Horn clauses. Its main features are。
  3. 所属分类:其它

    • 发布日期:2018-11-02
    • 文件大小:200704
    • 提供者:qq_35737030
  1. EOS.IO技术白皮书v2

  2. EOS.IO技术白皮书v2 官方中文翻译版, 2018年3月16日 摘要: EOS.IO软件引入了一种新的区块链架构,旨在实现分散式应用的垂直和水平扩展。这是通过创建一个类似操作系统的构造来实现的,在该构造上可以构建应用程序。该软件提供帐户,身份验证,数据库,异步通信以及跨多个CPU核心或群集的应用程序调度。由此产生的技术是一种区块链架构,最终可以扩展到每秒数百万次交易,消除用户费用,并允许在受治理的区块链环境中快速轻松地部署和维护分散式应用程序。 请注意:本白皮书中提到的密码令牌请参阅已发布
  3. 所属分类:以太坊

    • 发布日期:2018-11-08
    • 文件大小:389120
    • 提供者:a304779957
  1. Securing Microservice APIs

  2. There are several techniques for controlling access to web APIs in microservice architectures, ranging from network controls to cryptographic methods and platform-based capabilities. This short ebook introduces an API access control model that you ca
  3. 所属分类:微服务

    • 发布日期:2018-12-29
    • 文件大小:2097152
    • 提供者:maxchiu
  1. William Stallings,Cryptography and Network Security Principles and Practice(7th)

  2. 作者简介 Dr. William Stallings has authored 18 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of t
  3. 所属分类:网络安全

    • 发布日期:2019-04-24
    • 文件大小:8388608
    • 提供者:flyupwards66
  1. Dobot-Communication-Protocol-V1.1.4.pdf

  2. A beginning reader can read though the book to learn how cryptographic systems ... Every security theorem in the book is followed by a proof idea that explains.
  3. 所属分类:系统安全

    • 发布日期:2019-05-18
    • 文件大小:1048576
    • 提供者:weixin_45085394
  1. Furqan_Paper.rar

  2. Abstract—Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Of late, the research community is actively working towards exploiting cooperative communicatio
  3. 所属分类:系统安全

    • 发布日期:2019-05-19
    • 文件大小:4194304
    • 提供者:lijunxia20020
  1. hadoop-trunk.zip

  2. For the latest information about Hadoop, please visit our website at: http://hadoop.apache.org/ and our wiki, at: http://wiki.apache.org/hadoop/ This distribution includes cryptographic software. The country in which you currently reside may have re
  3. 所属分类:Hadoop

    • 发布日期:2019-06-09
    • 文件大小:51380224
    • 提供者:qq_39591064
« 1 2 ... 4 5 6 7 8 910 11 12 13 14 »