搜索结果
找到约 142 项符合
Encryption 的查询结果
按分类筛选
- 全部分类
- 加密解密 (84)
- CA认证 (9)
- Delphi控件源码 (5)
- VHDL/FPGA/Verilog (4)
- 其他书籍 (3)
- 其他 (3)
- Java编程 (2)
- Linux/Unix编程 (2)
- VC书籍 (2)
- 文件格式 (2)
- 行业发展研究 (2)
- 系统设计方案 (2)
- 学术论文 (1)
- 工控技术 (1)
- 单片机开发 (1)
- Internet/网络编程 (1)
- uCOS (1)
- 汇编语言 (1)
- Modem编程 (1)
- 压缩解压 (1)
- 网络 (1)
- RFID编程 (1)
- 电子书籍 (1)
- 游戏 (1)
- 文章/文档 (1)
- *行业应用 (1)
- Applet (1)
- matlab例程 (1)
- JavaScript (1)
- 书籍源码 (1)
- 驱动编程 (1)
- 手册 (1)
- 论文 (1)
- 技术资料 (1)
加密解密 A paper on the Rijndael encryption/decryption algorithm (now known as the AES standard) written by t
A paper on the Rijndael encryption/decryption algorithm (now known as the AES standard) written by the authors.
加密解密 A public-domain example implementation of the AES (Rijndael) encryption algorithm.
A public-domain example implementation of the AES (Rijndael) encryption algorithm.
Delphi控件源码 Encryption tool for delphi 2007. Conatain: Blowfish, MD5...
Encryption tool for delphi 2007. Conatain: Blowfish, MD5...
Delphi控件源码 Its a encryption tool for delphi 7. Its can encrypt with blowfish, md5, base64...
Its a encryption tool for delphi 7. Its can encrypt with blowfish, md5, base64...
书籍源码 Tiny Encryption Algorithm for secure communication.
Tiny Encryption Algorithm for secure communication.
加密解密 Application to generate Diffie-Hellman algorith encryption
Application to generate Diffie-Hellman algorith encryption
驱动编程 File System Filter Driver Example Code.. File Encryption Sample ..
File System Filter Driver Example Code..
File Encryption Sample ..
学术论文 MPEG2图像加密的FPGA实现
本论文讨论的是如何对符合DVB-T标准的数字图像无线监控系统中的MPEG2图像实现底层硬件的实时加/解密.数字图像无线监控系统是某公司研发的符合DVB-T标准的实时图像语音无线传输系统,通过对实时采集的图像等信息的发射与接收实现对远程现场的无线监控.为了保证图像数据在传输中的保密性,设计了基于FPGA的实时MPEG2图像加/解密 ...
加密解密 STM32 ID加密算法
读取STM32芯片内部唯一的标识,用于加密等区别其他芯片的操作,有完整注释,测试通过-STM32 chip to read a unique identifier for the encryption and other differences other chip operation, with complete notes, test
工控技术 工业系统安全问题和解决办法
Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCA ...