搜索结果
找到约 91 项符合
SECURE 的查询结果
按分类筛选
- 全部分类
- 书籍 (10)
- 加密解密 (9)
- Java编程 (7)
- 其他书籍 (4)
- 软件设计/软件工程 (4)
- 软件工程 (4)
- 技术资料 (4)
- 学术论文 (3)
- 文章/文档 (3)
- Linux/Unix编程 (3)
- 电子书籍 (3)
- 电源技术 (2)
- Java书籍 (2)
- VC书籍 (2)
- 网络 (2)
- 其他 (2)
- Internet/网络编程 (2)
- Symbian (2)
- 行业发展研究 (2)
- CA认证 (2)
- 资料/手册 (1)
- 单片机编程 (1)
- 嵌入式综合 (1)
- 无线通信 (1)
- 汇编语言 (1)
- USB编程 (1)
- 单片机开发 (1)
- 通讯编程文档 (1)
- 嵌入式/单片机编程 (1)
- MTK (1)
- 手机短信编程 (1)
- Jsp/Servlet (1)
- matlab例程 (1)
- 通讯/手机编程 (1)
- 书籍源码 (1)
- 认证考试资料 (1)
- 系统/网络安全 (1)
- 源码 (1)
- VIP专区 (1)
其他书籍 SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384,
SHA Hash algorithm.
This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA-
512.
软件设计/软件工程 good document about secure REST
good document about secure REST
Java编程 SHA (Secure Hash Algorithm
SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外 ...
文章/文档 journal of Secure Distributed Source Coding with Side-Information
journal of Secure Distributed Source Coding with Side-Information
CA认证 sah-1(Secure Hash Algorithm,安全散列算法)算法源程序
sah-1(Secure Hash Algorithm,安全散列算法)算法源程序
电子书籍 JPEG 2000 image coding system — Part 8: Secure JPEG 2000
JPEG 2000 image coding system — Part 8:
Secure JPEG 2000
Java编程 this is the document for the secure development in java. It covers in very good details the aspect o
this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java
Java编程 this is the document for the secure development in java. It covers in very good details the aspect o
this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java
书籍源码 Tiny Encryption Algorithm for secure communication.
Tiny Encryption Algorithm for secure communication.
书籍 Fundamental Limits on a Class of Secure
Abstract—In the future communication applications, users
may obtain their messages that have different importance levels
distributively from several available sources, such as distributed
storage or even devices belonging to other users. This
scenario is the best modeled by the multilevel diversity ...