搜索结果

找到约 91 项符合 Secure 的查询结果

其他书籍 SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384,

SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA- 512.
https://www.eeworm.com/dl/542/440172.html
下载: 187
查看: 1046

软件设计/软件工程 good document about secure REST

good document about secure REST
https://www.eeworm.com/dl/684/459985.html
下载: 194
查看: 1060

Java编程  SHA (Secure Hash Algorithm

 SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外 ...
https://www.eeworm.com/dl/633/460123.html
下载: 105
查看: 1037

文章/文档 journal of Secure Distributed Source Coding with Side-Information

journal of Secure Distributed Source Coding with Side-Information
https://www.eeworm.com/dl/652/460398.html
下载: 56
查看: 1025

CA认证 sah-1(Secure Hash Algorithm,安全散列算法)算法源程序

sah-1(Secure Hash Algorithm,安全散列算法)算法源程序
https://www.eeworm.com/dl/640/467042.html
下载: 170
查看: 1167

电子书籍 JPEG 2000 image coding system — Part 8: Secure JPEG 2000

JPEG 2000 image coding system — Part 8: Secure JPEG 2000
https://www.eeworm.com/dl/cadence/ebook/481123.html
下载: 105
查看: 1045

Java编程 this is the document for the secure development in java. It covers in very good details the aspect o

this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java
https://www.eeworm.com/dl/633/486976.html
下载: 154
查看: 1075

Java编程 this is the document for the secure development in java. It covers in very good details the aspect o

this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java
https://www.eeworm.com/dl/633/486981.html
下载: 139
查看: 1060

书籍源码 Tiny Encryption Algorithm for secure communication.

Tiny Encryption Algorithm for secure communication.
https://www.eeworm.com/dl/532/487861.html
下载: 135
查看: 1033

书籍 Fundamental Limits on a Class of Secure

Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity ...
https://www.eeworm.com/dl/521171.html
下载: 1
查看: 59