亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

cryptographic

  • A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi

    A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust anchors, and establish security services based on certificates that may be validated using one of their trust anchors.

    標簽: Infrastructure cryptographic entities physical

    上傳時間: 2017-07-31

    上傳用戶:561596

  • The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at

    The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.

    標簽: cryptographic applications attractive for

    上傳時間: 2013-12-07

    上傳用戶:zhuimenghuadie

  • A thesis on developing multiple-precision integer libraries for cryptographic and other uses.

    A thesis on developing multiple-precision integer libraries for cryptographic and other uses.

    標簽: multiple-precision cryptographic developing libraries

    上傳時間: 2014-01-10

    上傳用戶:xiaohuanhuan

  • Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the N

    Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm

    標簽: functions hash cryptographic Algorithm

    上傳時間: 2014-11-09

    上傳用戶:1109003457

  • 工業系統安全問題和解決辦法

    Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, anddistributed control systems (DCSs), and then discusses security issues and remedies. This document alsoexplains the benefits and limitations of two cryptographic solutions (digital signatures and encryption) andelaborates on the reasons for using security ICs in an ICS to support cryptography.

    標簽: 工業系統 安全問題

    上傳時間: 2013-10-09

    上傳用戶:woshinimiaoye

  • Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wir

    Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wireless cards, automatic network IP block detection via UDP, ARP, and DHCP packets, Cisco equipment lists via Cisco Discovery Protocol, weak cryptographic packet logging, and Ethereal and tcpdump compatible packet dump files. It also includes the ability to plot detected networks and estimated network ranges on downloaded maps or user supplied image files. Kismet是一個針對IEEE802.11b無線局域網的嗅探和包分析器,支持大多數無線網卡,支持自動檢測UDP、ARP和DHCP的數據包,支持通過CDP協議檢測思科網絡設備,支持加密數據包記錄,采用與Ethereal和Tcpdump兼容的的數據包記錄文件,支持通過用戶提供地圖來檢測和評估無線網絡范圍。

    標簽: network dissector sniffing capable

    上傳時間: 2014-11-26

    上傳用戶:wweqas

  • Secure Programming Cookbook for C and C++ is an important new resource for developers serious about

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

    標簽: Programming developers for important

    上傳時間: 2015-09-03

    上傳用戶:gundan

  • 《為Windows Vista編寫安全的代碼》

    《為Windows Vista編寫安全的代碼》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars

    標簽: Windows Vista 編寫 代碼

    上傳時間: 2016-01-07

    上傳用戶:zxc23456789

  • This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message au

    This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared secret key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. The HMAC specification in this standard is a generalization of Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI X9.71, Keyed Hash Message Authentication Code.

    標簽: message authentication keyed-hash describes

    上傳時間: 2014-01-07

    上傳用戶:鳳臨西北

  • The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which impl

    The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required cryptographic algorithm rather than having to hardcode a specific provider.

    標簽: Cryptography Generation framework Windows

    上傳時間: 2013-12-18

    上傳用戶:semi1981

主站蜘蛛池模板: 嘉鱼县| 霍邱县| 长兴县| 射洪县| 贵阳市| 五大连池市| 大安市| 通州区| 泉州市| 张北县| 广东省| 辉县市| 登封市| 邮箱| 扶绥县| 栖霞市| 禹城市| 阳高县| 会理县| 芦溪县| 沧州市| 屯昌县| 太原市| 方城县| 沾化县| 利津县| 湖口县| 四川省| 西城区| 和平县| 友谊县| 玉门市| 大悟县| 余姚市| 宜兰市| 赤城县| 扶余县| 法库县| 阿拉善左旗| 四子王旗| 屏东市|