Elliptic Curve CRYPTOGRAPHY full working C code for encryption and decryprion.
標簽: CRYPTOGRAPHY encryption decryprion Elliptic
上傳時間: 2017-07-26
上傳用戶:kbnswdifs
applied CRYPTOGRAPHY ebook by bruce scheneier
標簽: CRYPTOGRAPHY scheneier applied bruce
上傳時間: 2013-12-15
上傳用戶:ljmwh2000
CRYPTOGRAPHY In C And C++
標簽: CRYPTOGRAPHY And In
上傳時間: 2017-08-09
上傳用戶:lwwhust
Bruce Shnayer "applied CRYPTOGRAPHY"
標簽: CRYPTOGRAPHY Shnayer applied Bruce
上傳時間: 2017-09-13
上傳用戶:TF2015
this is a matlab code of the method of visual CRYPTOGRAPHY based in the shadows method of Visual CRYPTOGRAPHY, Moni Naor, Adi Shamir.
標簽: method CRYPTOGRAPHY the of
上傳時間: 2017-09-13
上傳用戶:epson850
CRYPTOGRAPHY in C and C++第二版
標簽: CRYPTOGRAPHY and in
上傳時間: 2018-03-20
上傳用戶:962644105
Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, anddistributed control systems (DCSs), and then discusses security issues and remedies. This document alsoexplains the benefits and limitations of two cryptographic solutions (digital signatures and encryption) andelaborates on the reasons for using security ICs in an ICS to support CRYPTOGRAPHY.
上傳時間: 2013-10-09
上傳用戶:woshinimiaoye
This book offers 226 code recipes applicable to a variety of difficulties that may arise in the process of application development. Topics covered include XML processing, Windows forms, database access, networking, runtime security, CRYPTOGRAPHY and more.
標簽: difficulties applicable recipes variety
上傳時間: 2015-07-21
上傳用戶:朗朗乾坤
Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key CRYPTOGRAPHY, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.
標簽: Programming developers for important
上傳時間: 2015-09-03
上傳用戶:gundan
CCISP考試指南與導讀 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – OPERATIONS SECURITY 56 DOMAIN 7 – APPLICATIONS AND SYSTEM DEVELOPMENT 63 DOMAIN 8 – BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING 70 DOMAIN 9 – LAW, INVESTIGATION AND ETHICS 78 DOMAIN 10 – PHYSICAL SECURITY 87
標簽: CISSP MANAGEMENT PRACTICES SECURITY
上傳時間: 2014-02-13
上傳用戶:sy_jiadeyi