搜索结果

找到约 239 项符合 security 的查询结果

行业发展研究 During the past four years, most of our research activities have been focused on image but also vide

During the past four years, most of our research activities have been focused on image but also video and 3-D objects processing for security applications (watermarking and biometrics) and communications (talking heads, interfaces), with a special emphasis on facial images. More about our work can b ...
https://www.eeworm.com/dl/692/455778.html
下载: 139
查看: 1084

其他书籍 Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and n

Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and network administration tasks. This section explains how to enable and disable the perl scripting service, and how to use Cisco E-DI Perl API for daily tasks. When a perl script is implemented by an admi ...
https://www.eeworm.com/dl/542/461785.html
下载: 125
查看: 1029

软件工程 This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only b

This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It s detailed, well researched and the technical information is excellent. The level of tech ...
https://www.eeworm.com/dl/540/463102.html
下载: 129
查看: 1030

加密解密 MD5的全称是Message-digest Algorithm 5(信息-摘要算法)

MD5的全称是Message-digest Algorithm 5(信息-摘要算法),在90年代初由MIT Laboratory for Computer Science和RSA Data Security Inc,的Ronald.L.Rivest开发出来,经MD2、MD3和MD4发展而来。
https://www.eeworm.com/dl/519/464336.html
下载: 61
查看: 1048

行业发展研究 about encryption method of the quantom . this way is the new method for powerfull encrypting message

about encryption method of the quantom . this way is the new method for powerfull encrypting messages for security applets.
https://www.eeworm.com/dl/692/465417.html
下载: 73
查看: 1077

软件设计/软件工程 Steganography is the art of communicating a message by embedding it into multimedia data. It is desi

Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An appropriate information-theoretic model for steganography has ...
https://www.eeworm.com/dl/684/471185.html
下载: 51
查看: 1049

行业发展研究 A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi

A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust anchors, and establi ...
https://www.eeworm.com/dl/692/472180.html
下载: 89
查看: 1060

加密解密 This program applies Simplified DES (S-DES) Ciphering Algorithm Developed by Maimouna Al-ammar 5t

This program applies Simplified DES (S-DES) Ciphering Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
https://www.eeworm.com/dl/519/476053.html
下载: 124
查看: 1026

加密解密 This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Compu

This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
https://www.eeworm.com/dl/519/476061.html
下载: 36
查看: 1057

加密解密 This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar

This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
https://www.eeworm.com/dl/519/476072.html
下载: 27
查看: 1035