搜索结果

找到约 25 项符合 Cryptographic 的查询结果

文章/文档 this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp

this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.
https://www.eeworm.com/dl/652/417795.html
下载: 43
查看: 1051

数学计算 pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small chang ...
https://www.eeworm.com/dl/641/429179.html
下载: 51
查看: 1136

加密解密 fips1402.pdf

关于美国fips140的文档 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
https://www.eeworm.com/dl/501088.html
下载: 2
查看: 1073

C/C++语言编程 capicom xenroll cab dll

为了支持密码编译功能,微软在 Windows API 之中加入了 Cryptographic API (CryptoAPI)??,然而 CryptoAPI 的使用方法相当复杂,为了简化 CryptoAPI 的使用,微软即将它以 COM 的方式包装成 CAPICOM?,让应用程序只需要利用 COM 调用方式,即可使用 CryptoAPI。 ...
https://www.eeworm.com/dl/501149.html
下载: 2
查看: 1050

书籍 Physical Layer Security in Wireless Communications

The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have trie ...
https://www.eeworm.com/dl/522054.html
下载: 1
查看: 79