切换至中文 Over 1 million code package, 10 million code file free download
  • [Tcl-Tk] blackholeaodv.rar the script of simulation AODV routing blackhole attack under the ns2
    Category: Windows Develop Upload User:bfsjjj Size:56K
  • [Visual C++ (VC++)] twopipestelnetcmd.rar Shellcode on the target machine through the establishment of the host, through the attack to open a cmd.exe, the operation can be achieved, such as dir
    Category: Windows Develop Upload User:songxy Size:2K
  • [Visual Basic (VB)] plane.rar ... to fight the game, there are sound effects, background music, there are points, automatic games, non-automatic, is to use the mouse to operate the missile hair flying in the air combat aircraft, aircraft also fired missiles to attack ground launchers
    Category: Game Program Upload User:sz87350728 Size:307K
  • [Video] 200080919ddos.rar Types of hacker attacks, DDos attack and preventive measures and strategies, a very good video tutorials for new operations
    Category: Other eBooks Upload User:xinanfamen Size:3118K
  • [PDF] CryptanalysisofHwang-ChangsaTime-StampProtocolforD ... can intercept these transmitted data. Then, he can launch an off-line attack to analyze these intercepted data. We will describe the attacker’s action in this article. After that, we propose an improved scheme to prevent this off-line attack.
    Category: Document Upload User:yingda Size:387K
  • [PDF] OnDesignatedlyVerifiedNon-interactive)Watermarking ... similar watermarking scheme. In this paper, we propose a cryptanalytic attack on both of these schemes that allows a dishonest ... are valid.We modify the above schemes to overcome the attack. Further, we also propose a new robust watermarking scheme ...
    Category: Document Upload User:rongda_110 Size:142K
  • [PDF] CryptanalysisofaNewChaoticCryptosystemBasedonErgod This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack. Some other design weaknesses are also shown.
    Category: Document Upload User:hong_fa168 Size:173K
  • [PDF] Cryptanalysisofanimageencryptionscheme.rar ... process involves a permutation operation and an XORlike transformation of the shuffled pixels, which are controlled by three chaotic systems. This paper discusses some defects of the schemes and how to break them with a chosen-plaintext attack.
    Category: Document Upload User:hxjsj20 Size:246K
  • [Java/JSP] CEnemy.rar J2me mobile game in the realization of a monster in the process. Included in the document the life of a monster attack, and their own actions and so on.
    Category: J2ME Upload User:ks7816 Size:2K
  • [HTML/CSS] IE-0day-code.rar 0-day attack
    Category: Windows Develop Upload User:yataidq Size:2K