搜索资源列表
digitalsignature
- 数字签名的工作原理和用C++BUILDER实现的程序清单。得到的签名数据可以单独保存,也可以分开保存。-digital signatures, the principle and C BUILDER achieve the program list. The signature data can be kept separate, can be kept separate.
multicastpaper
- 论文标题:组播安全机制的研究与设计 作者:于福海 作者专业:计算机技术 导师姓名:原萍 授予学位:硕士 授予单位:东北大学 授予学位时间:20050701 论文页数:1-61 文摘语种:中文文摘 分类号:TP393.08 关键词:组播通信 安全机制 源认证 组密钥管理 摘要:本文结合课题实际特点,以组播安全为主题,对310网(全军局域网)中的组播提供安全保障进行了系统的研究。 对组播安全的基础理论与方法进行了分析与研究,抽取出了对称加密、
The_Method_of_Java2_Applet_Digital_Sign
- 当Java Applet涉及到本地资源,必须对APPLET进行数字签名和认证。本文详细地介绍了在服务器端、客户端具体操作过程。-involving local resources, APPLET be right for digital signatures and authentication. This paper introduces a server, the client operating process.
NET
- The public key infrastructure (PKI) is the foundation and center of network security architecture now, can provide security services including confidentiality, authentication, dig2ital signatures and integrity.
Secure Web Forms with Client-Side Signatures
- The World Wide Web is evolving from a platform for infor- mation access into a platform for interactive services. The interaction of the services is provided by forms. Some of these services, such as bank- ing and e-commerce, require secure, non-repu
handwritehaha
- 在线手写签名的识别算法,用于对手写的签名进行在线识别-On-line handwritten signature recognition algorithm for handwritten signatures on-line identification
shuziqianmingjidianqi
- 数字签名与继电器的结合,具有现代理论风格-The combination of digital signatures and relay, with the modern theory of style
qw
- It has been proved that network coding can be used to improve the throughput for multicast t ransmission , but such systems are very vulnerable to contamination at tack , and the signatures for t raditional network are no longer suitable for net
we
- It has been proved that network coding can be used to improve the throughput for multicast t ransmission , but such systems are very vulnerable to contamination at tack , and the signatures for t raditional network are no longer suitable for net
DTWqianmingrenzheng
- 通过使用该文档中所描述的内容,用户可用手写签名进行身份认证。-By using this document describes the content, the user can authenticate handwritten signatures.
batchdsa.pdf
- this a pdf file.this file is very useful to learn about signatures.-this is a pdf file.this file is very useful to learn about signatures.
Wind-Turbine-Condition-Monitoring--
- 风力发电故障诊断的方法相关,运机机械与电气手段进行诊断-W ind Turbine Condition Monitoring and Fault Diagnosis Using both Mechanical and Electrical Signatures
permutation-scanning-worms
- In recent years, both sophistication and damage potential of Internet worms have increased tremendously. To understand their threat, we need to look into their payload for signatures as well as propagation pattern for Internet-scale behavior. An accu
Extended_Cyclostationary_Signatures_for_OFDM-Base
- Extended Cyclostationary Signatures for OFDM-Based Cognitive Radio
Bin_Rockey4_2.x_Dongle_CPP_library_IDA_Signatures
- Another signatures for Rockey4nd and IDA
FACE3D-Series
- Abstract—Recently, a 3D face recognition approach based on geometric invariant signatures, has been proposed. The key idea of the algorithm is a representation of the facial surface, invariant to isometric deformations, such as those result
81
- Texture Classification by Wavelet Packet Signatures
fast_Kmeans
- web image reranking using query specific semantic signatures inmatlab
Autosar_TransGG
- A transformer provides well defined function signatures per each communication relation (port based and signal based), which is marked for transformation. The function signature depends on the transmitted data elements (Client/Server operation si