资源列表
C_array
- c array(basic c programming)
C_Array_And_String
- C Array And String(basic c programming)
C_File_Processing
- C File Processing(basic c programming)
C_Selection_Structure
- C Selection Structure(basic c programming)
123
- 电路板设计中差分信号线布线的优点和布线策略-abcdefg
CryptanalysisofHwang-ChangsaTime-StampProtocolforD
- Cryptanalysis of Hwang-Changs a Time-Stamp Protocol for Digital Watermarking-In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit watermarking. They claimed that their scheme is secure against attacks. However, in this article,
OnDesignatedlyVerifiedNon-interactive)Watermarking
- On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is a possible solution for this
FromWeaktoStrongWatermarking
- From Weak to Strong Watermarking-The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the conte
CryptanalysisofaNewChaoticCryptosystemBasedonErgod
- Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity-This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack.
Cryptanalysisofanimageencryptionscheme
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed
UsingvisualtagstobypassBluetoothdevicediscovery.ra
- Using visual tags to bypass Bluetooth device discovery.-One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth
HandoffsupportformobilitywithIPoverBluetooth
- Handoff support for mobility with IP over Bluetooth-One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth conn