-
-
[
Visual C++ (VC++)]
mima.rar
... ... 25. Expressly letters m, ciphertext c, the key k, c = m+ ki mod 26 (I = 1,2, 3). For example: m = " data security" corresponds to the number of " 3,0,19,0,18 ,......, 19,24" k = " best" corresponding figure for the " 1 ...
-
[
Windows_Unix]
ei2002_stego.ps.gz
... it into multimedia data. It is desired to maximize the
amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An appropriate
information-theoretic model for steganography has been proposed by ...
-
[
Others]
NIST_Recommendation_for_X509_PVMs.pdf.zip
... issue digital certificates and
distribute certificate status information. PKI users select one or more certificate issuers as
trust anchors, and establish security services based on certificates that may be validated
using one of their trust anchors.
-
-
-
[
Matlab]
SDES.rar
This program applies Simplified DES (S-DES) Ciphering Algorithm
Developed by Maimouna Al-ammar
5th Year, Computer Engineering Department, University of Damascus
Information and Network Security Material
-
[
Matlab]
RSA.rar
This program applies Message Digest MD5 Algorithm
Developed by Maimouna Al-ammar
5th Year, Computer Engineering Department, University of Damascus
Information and Network Security Material
-
[
Matlab]
MD5.rar
This program applies Message Digest (MD5) Algorithm
Developed by Maimouna Al-ammar
5th Year, Computer Engineering Department, University of Damascus
Information and Network Security Material
-
[
Delphi]
delphi_7_interbase_tutorial.zip
...
InterBase Windows ISQL dialog. You learn to create data structures that enforce referential integrity
constraints and maintain security. You populate your tables, create triggers and stored procedures,
and learn a number of techniques for retrieving ...
Category:
Delphi VCL Upload User:
alun_1977 Size:
472K
-