搜索资源列表
DES(c++)
- 在通信网络的两端,双方约定一致的Key,在通信的源点用Key对核心数据进行DES加密,然后以密码形式在公共通信网(如电话网)中传输到通信网络的终点,数据到达目的地后,用同样的Key对密码数据进行解密,便再现了明码形式的核心数据。这样,便保证了核心数据在公共通信网中传输的安全性和可靠性。-communications networks in the two ends, the two sides agreed unanimously the Key, In communications with
HackerKit
- 黑客入侵网络的数个使用工具-hacking the networks use several tools
数据加密算法
- 目前企业面临的计算环境和过去有很大的变化,许多数据资源能够依靠网络来远程存取,而且越来越多的通讯依赖于公共网络公共网络(如 Internet),而这些环境并不保证实体间的安全通信,数据在传输过程可能被其它人读取或篡改。-currently facing the enterprise computing environment and past a great change, many data resources to be able to rely on remote network acce
aircrack-ng-1.0-rc4.tar.gz
- 无限网络破解aircrack-ng1.0rc4,Wireless networks crack aircrack-ng1.0rc4
lc4
- Security 用户: NT AUTHORITY\SYSTEM 计算机: C9D21BEA1BF645B 主要用户名: SYSTEM 主域: NT AUTHORITY 主登录 ID: (0x0,0x3E7) 客户端用户名: SYSTEM 客户端域: NT AUTHORITY 客户端登录 ID: (0x0,0x3E7) 有关更多信息,请参阅在 http://go.microsoft.com/fwlink/e
NewECC
- ECC Encryption used for high level data security in networks.
zcmglsetup
- 共享软件作者,在发布软件时,总会碰到软件注册机制的问题,特别是共享软件新手,为了找资料,常常把互联网都翻了个遍,实在是苦不堪言。本工作室彩票软件的开发过程中也是遇到这样的问题,还好有网络,最终还是找到了解决的方法。本软件系统从基本的加、解密算法,到最终在软件中运用,均有涉及,对共享软件新手绝对是难得的资料。使用者可以利用本软件内附的VB源代码做出自己软件的注册机。-Shareware author, publishing software, software registration sys
RAIL
- program in c demonstrating the railfence cipher which is widely used in networks. the code is best suited for beginners, because of the implementation of logic in an easier way.
LEACH
- leach code for 30 nodes
manuscript
- of impulses are studied: the impulses are input disturbances the impulses are ``neutral type, that is, they are neither helpful for stability of neural networks nor destabilizing and the impulses are stabilizing. For each type of impulses, b
2286
- Similar to many technological developments, wireless sensor networks have emerged from military needs and found its way into civil applications. Today, wireless sensor networks has become a key technology for different types of ”smart environme
Modern-Network-Design
- 本书是与陈向阳 谈宏华 张彦铎 李伟波等主编的 《现代网络技术》 即 “Modern Computer Networks”配套使用的实践指导用书。要求学生按照实验步骤独立完成,从而理解基本的网络原理,提高实际动手能力,以达到对网络知识的完整掌握。-This book is about the macro Huazhang Yan Chen Xiangyang Duo ABA and other editor of the " modern network technology"
Shabake_bisim
- wireless network include topology an any constraint may be occured in such networks well described in this file
wuxianwangluo
- 该文档无线网络密码破解,希望对大家有所帮助-The document password cracking wireless networks, we hope to help
a51
- A5 is a stream cipher. A5 is based on a combination of three linear feedback shift registers (LFSRs) with irregular clocking. It uses 64 bit keys. The register lengths are 19, 22, and 23. All the feedback polynomials are sparse. The output is the XOR
10.1.1.165.8742
- Secure Antnet Routing Algorithm for Scalable Adhoc Networks Using Elliptic Curve Cryptography
the-RC4-algorithm
- RC4算法是一种在电子信息领域加密的技术手段,用于无线通信网络。-The RC4 algorithm is the encryption technology in the field of electronic information means for wireless communication networks.
ANN_ImageCompression
- Good application for images compression.with neural networks
tainter
- Decryption of Chaotically Encrypted Signals Using Neural Networks
wirelesskeyview
- 专用于对于周围用户的无线网络的破解及备份-Dedicated to the user s wireless networks around the crack and backup