亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

CRYPTOgraphic

  • this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp

    this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various CRYPTOgraphic techniques are described here.

    標(biāo)簽: i.e. CRYPTOGRAPHY information the

    上傳時間: 2014-01-27

    上傳用戶:ls530720646

  • pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

    pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike CRYPTOgraphic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.

    標(biāo)簽: perceptual implementation algorithms fingerpr

    上傳時間: 2013-12-08

    上傳用戶:星仔

  • fips1402.pdf

    關(guān)于美國fips140的文檔 SECURITY REQUIREMENTS FOR CRYPTOgraphic MODULES

    標(biāo)簽: FIPS

    上傳時間: 2015-03-08

    上傳用戶:lipei

  • capicom xenroll cab dll

    為了支持密碼編譯功能,微軟在 Windows API 之中加入了 CRYPTOgraphic API (CryptoAPI)??,然而 CryptoAPI 的使用方法相當(dāng)復(fù)雜,為了簡化 CryptoAPI 的使用,微軟即將它以 COM 的方式包裝成 CAPICOM?,讓應(yīng)用程序只需要利用 COM 調(diào)用方式,即可使用 CryptoAPI。

    標(biāo)簽: capicom

    上傳時間: 2015-03-12

    上傳用戶:dai48625

  • Physical Layer Security in Wireless Communications

    The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have tried hard to continuously come up with improved crypto- graphic algorithms. But typically we do not need to wait too long to find an efficient way to crack these algorithms. With the rapid progress of computational devices, the current CRYPTOgraphic methods are already becoming more unreliable. In recent years, wireless re- searchers have sought a new security paradigm termed physical layer security. Unlike the traditional CRYPTOgraphic approach which ignores the effect of the wireless medium, physi- cal layer security exploits the important characteristics of wireless channel, such as fading, interference, and noise, for improving the communication security against eavesdropping attacks. This new security paradigm is expected to complement and significantly increase the overall communication security of future wireless networks.

    標(biāo)簽: Communications Physical Security Wireless Layer in

    上傳時間: 2020-05-31

    上傳用戶:shancjb

主站蜘蛛池模板: 雷州市| 丰顺县| 尼勒克县| 扎鲁特旗| 沁阳市| 来安县| 晋宁县| 阳新县| 临高县| 宁化县| 林芝县| 延边| 兴化市| 行唐县| 内丘县| 威宁| 泸定县| 盖州市| 安远县| 二连浩特市| 城固县| 荣成市| 梁平县| 三门县| 桂平市| 和顺县| 乳山市| 甘谷县| 佛山市| 滨海县| 全南县| 彭水| 中西区| 岚皋县| 高尔夫| 泗洪县| 于田县| 岑溪市| 内丘县| 桓台县| 三河市|