切换至中文 Over 1 million code package, 10 million code file free download
  • [Visual C++ (VC++)] mima.rar ... ... 25. Expressly letters m, ciphertext c, the key k, c = m+ ki mod 26 (I = 1,2, 3). For example: m = " data security" corresponds to the number of " 3,0,19,0,18 ,......, 19,24" k = " best" corresponding figure for the " 1 ...
    Category: Other windows programs Upload User:ehlighting Size:231K
  • [Windows_Unix] ei2002_stego.ps.gz ... it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An appropriate information-theoretic model for steganography has been proposed by ...
    Category: Windows Develop Upload User:wuyi06 Size:90K
  • [Others] NIST_Recommendation_for_X509_PVMs.pdf.zip ... issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust anchors, and establish security services based on certificates that may be validated using one of their trust anchors.
    Category: Development Research Upload User:jinwendeng Size:80K
  • [PPT] DesigningaPublishSubscribeSubstrateforPrivacySecu ppt about file security
    Category: Other eBooks Upload User:stjooge Size:308K
  • [PPT] securityp2p.rar ppt for security in peer to peer network
    Category: Windows Develop Upload User:chechi9999 Size:30K
  • [Matlab] SDES.rar This program applies Simplified DES (S-DES) Ciphering Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
    Category: Crypt_Decrypt algrithms Upload User:xinyuan918 Size:2K
  • [Matlab] RSA.rar This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
    Category: Crypt_Decrypt algrithms Upload User:xhjmsc Size:15K
  • [Matlab] MD5.rar This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
    Category: Crypt_Decrypt algrithms Upload User:gerdnlight Size:6K
  • [Delphi] delphi_7_interbase_tutorial.zip ... InterBase Windows ISQL dialog. You learn to create data structures that enforce referential integrity constraints and maintain security. You populate your tables, create triggers and stored procedures, and learn a number of techniques for retrieving ...
    Category: Delphi VCL Upload User:alun_1977 Size:472K
  • [Windows_Unix] Decuong.rar This is a NetWork Security document!
    Category: Windows Develop Upload User:als3031 Size:964K