亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊(cè)

cryptographic

  • this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp

    this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.

    標(biāo)簽: i.e. CRYPTOGRAPHY information the

    上傳時(shí)間: 2014-01-27

    上傳用戶:ls530720646

  • pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

    pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.

    標(biāo)簽: perceptual implementation algorithms fingerpr

    上傳時(shí)間: 2013-12-08

    上傳用戶:星仔

  • fips1402.pdf

    關(guān)于美國fips140的文檔 SECURITY REQUIREMENTS FOR cryptographic MODULES

    標(biāo)簽: FIPS

    上傳時(shí)間: 2015-03-08

    上傳用戶:lipei

  • capicom xenroll cab dll

    為了支持密碼編譯功能,微軟在 Windows API 之中加入了 cryptographic API (CryptoAPI)??,然而 CryptoAPI 的使用方法相當(dāng)復(fù)雜,為了簡化 CryptoAPI 的使用,微軟即將它以 COM 的方式包裝成 CAPICOM?,讓應(yīng)用程序只需要利用 COM 調(diào)用方式,即可使用 CryptoAPI。

    標(biāo)簽: capicom

    上傳時(shí)間: 2015-03-12

    上傳用戶:dai48625

  • Physical Layer Security in Wireless Communications

    The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have tried hard to continuously come up with improved crypto- graphic algorithms. But typically we do not need to wait too long to find an efficient way to crack these algorithms. With the rapid progress of computational devices, the current cryptographic methods are already becoming more unreliable. In recent years, wireless re- searchers have sought a new security paradigm termed physical layer security. Unlike the traditional cryptographic approach which ignores the effect of the wireless medium, physi- cal layer security exploits the important characteristics of wireless channel, such as fading, interference, and noise, for improving the communication security against eavesdropping attacks. This new security paradigm is expected to complement and significantly increase the overall communication security of future wireless networks.

    標(biāo)簽: Communications Physical Security Wireless Layer in

    上傳時(shí)間: 2020-05-31

    上傳用戶:shancjb

主站蜘蛛池模板: 治县。| 自贡市| 子洲县| 定州市| 丽江市| 云梦县| 灌云县| 鄂托克前旗| 措勤县| 玉林市| 肃宁县| 宁陕县| 鸡西市| 廊坊市| 扎赉特旗| 鸡东县| 宁化县| 陇南市| 营口市| 商丘市| 拉孜县| 乌海市| 藁城市| 房产| 青海省| 新巴尔虎左旗| 荥经县| 富裕县| 张家口市| 武宣县| 肥东县| 安顺市| 潢川县| 弥勒县| 四子王旗| 秭归县| 玛沁县| 海阳市| 梁山县| 毕节市| 伊宁县|