搜索结果

找到约 25 项符合 Cryptographic 的查询结果

行业发展研究 A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi

A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust anchors, and establi ...
https://www.eeworm.com/dl/692/472180.html
下载: 89
查看: 1060

加密解密 The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at

The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfi ...
https://www.eeworm.com/dl/519/481913.html
下载: 120
查看: 1035

数学计算 A thesis on developing multiple-precision integer libraries for cryptographic and other uses.

A thesis on developing multiple-precision integer libraries for cryptographic and other uses.
https://www.eeworm.com/dl/641/484589.html
下载: 199
查看: 1042

Java编程 Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the N

Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
https://www.eeworm.com/dl/633/490265.html
下载: 25
查看: 1120

工控技术 工业系统安全问题和解决办法

Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCA ...
https://www.eeworm.com/dl/569/40930.html
下载: 36
查看: 1058

网络 Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wir

Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wireless cards, automatic network IP block detection via UDP, ARP, and DHCP packets, Cisco equipment lists via Cisco Discovery Protocol, weak cryptographic packet logging, and Ethereal and tcpdump compat ...
https://www.eeworm.com/dl/635/145700.html
下载: 115
查看: 1082

VC书籍 Secure Programming Cookbook for C and C++ is an important new resource for developers serious about

Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, sy ...
https://www.eeworm.com/dl/686/192064.html
下载: 129
查看: 1082

其他书籍 《为Windows Vista编写安全的代码》

《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. ...
https://www.eeworm.com/dl/542/243577.html
下载: 162
查看: 1029

加密解密 This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message au

This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared secret key. The cryptographic strength of HMAC de ...
https://www.eeworm.com/dl/519/303374.html
下载: 76
查看: 1028

加密解密 The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which impl

The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required cryptographic algorithm rather than having to hardcode a specific provider.
https://www.eeworm.com/dl/519/347325.html
下载: 40
查看: 1060