CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 文档资料

资源列表

« 1 2 ... .75 .76 .77 .78 .79 15680.81 .82 .83 .84 .85 ... 16322 »
  1. C_array

    0下载:
  2. c array(basic c programming)
  3. 所属分类:Document

    • 发布日期:2017-04-24
    • 文件大小:14104
    • 提供者:温耀文
  1. C_Array_And_String

    0下载:
  2. C Array And String(basic c programming)
  3. 所属分类:Document

    • 发布日期:2017-04-09
    • 文件大小:14775
    • 提供者:温耀文
  1. C_File_Processing

    0下载:
  2. C File Processing(basic c programming)
  3. 所属分类:Document

    • 发布日期:2017-04-16
    • 文件大小:13715
    • 提供者:温耀文
  1. C_Selection_Structure

    0下载:
  2. C Selection Structure(basic c programming)
  3. 所属分类:Document

    • 发布日期:2017-04-25
    • 文件大小:103943
    • 提供者:温耀文
  1. 123

    0下载:
  2. 电路板设计中差分信号线布线的优点和布线策略-abcdefg
  3. 所属分类:Document

    • 发布日期:2017-04-05
    • 文件大小:21871
    • 提供者:sunny
  1. CryptanalysisofHwang-ChangsaTime-StampProtocolforD

    0下载:
  2. Cryptanalysis of Hwang-Changs a Time-Stamp Protocol for Digital Watermarking-In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit watermarking. They claimed that their scheme is secure against attacks. However, in this article,
  3. 所属分类:Document

    • 发布日期:2017-04-01
    • 文件大小:395846
    • 提供者:xiaowang
  1. OnDesignatedlyVerifiedNon-interactive)Watermarking

    0下载:
  2. On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is a possible solution for this
  3. 所属分类:Document

    • 发布日期:2017-03-23
    • 文件大小:144972
    • 提供者:xiaowang
  1. FromWeaktoStrongWatermarking

    0下载:
  2. From Weak to Strong Watermarking-The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the conte
  3. 所属分类:Document

    • 发布日期:2017-04-16
    • 文件大小:313233
    • 提供者:xiaowang
  1. CryptanalysisofaNewChaoticCryptosystemBasedonErgod

    0下载:
  2. Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity-This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack.
  3. 所属分类:Document

    • 发布日期:2017-04-01
    • 文件大小:177331
    • 提供者:xiaowang
  1. Cryptanalysisofanimageencryptionscheme

    0下载:
  2. Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed
  3. 所属分类:Document

    • 发布日期:2017-04-04
    • 文件大小:251692
    • 提供者:xiaowang
  1. UsingvisualtagstobypassBluetoothdevicediscovery.ra

    0下载:
  2. Using visual tags to bypass Bluetooth device discovery.-One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth
  3. 所属分类:Document

    • 发布日期:2017-03-29
    • 文件大小:200384
    • 提供者:nihao
  1. HandoffsupportformobilitywithIPoverBluetooth

    0下载:
  2. Handoff support for mobility with IP over Bluetooth-One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth conn
  3. 所属分类:Document

    • 发布日期:2017-04-09
    • 文件大小:1053615
    • 提供者:wang
« 1 2 ... .75 .76 .77 .78 .79 15680.81 .82 .83 .84 .85 ... 16322 »
搜珍网 www.dssz.com