搜索结果

找到约 12,507 项符合 A-Key 的查询结果

CA认证 在cdma2000移动通信系统中使用A-Key实现空中接口部分无线接入的身份验证和加密密钥的产生。

在cdma2000移动通信系统中使用A-Key实现空中接口部分无线接入的身份验证和加密密钥的产生。
https://www.eeworm.com/dl/640/228748.html
下载: 165
查看: 1056

Delphi控件源码 Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite

Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite handy with INI files which you can use to get and set data for you applications. You can also check out some dates related to passwords and expiry dates. Send emails using Microsoft Email client. No n ...
https://www.eeworm.com/dl/666/423252.html
下载: 101
查看: 1050

压缩解压 EZW coding implementation. using wavelet transforms as a key tool. compression and decoding is done

EZW coding implementation. using wavelet transforms as a key tool. compression and decoding is done using EZW algorithm.
https://www.eeworm.com/dl/617/425882.html
下载: 178
查看: 1021

压缩解压 EZW coding implementation. using wavelet transforms as a key tool. compression and decoding is done

EZW coding implementation. using wavelet transforms as a key tool. compression and decoding is done using modified EZW algorithm.
https://www.eeworm.com/dl/617/425883.html
下载: 84
查看: 1034

压缩解压 SPIHT coding implementation. using wavelet transforms as a key tool. compression and decoding is don

SPIHT coding implementation. using wavelet transforms as a key tool. compression and decoding is done using SPIHT algorithm.
https://www.eeworm.com/dl/617/425885.html
下载: 190
查看: 1067

软件设计/软件工程 Learn how to leverage a key Java technology used to access relational data from Java programs, in

Learn how to leverage a key Java technology used to access relational data from Java programs, in an Oracle environment. Author Donald Bales begins by teaching you the mysteries of establishing database connections, and how to issue SQL queries and get results back. You ll move on to advanced to ...
https://www.eeworm.com/dl/684/472671.html
下载: 23
查看: 1150

驱动编程 Driver Virtual keyboard. Allows you to create programs that need to send a key to bypass Win32. Suit

Driver Virtual keyboard. Allows you to create programs that need to send a key to bypass Win32. Suitable for games where prohibited send key.
https://www.eeworm.com/dl/618/473567.html
下载: 90
查看: 1060

其他 memcat - Copy the value of a key to standard output memflush - Flush the contents of your servers.

memcat - Copy the value of a key to standard output memflush - Flush the contents of your servers. memrm - Remove a key(s) from the server. memstat - Dump the stats of your servers to standard output memslap - Load generation utility (benchmark!)
https://www.eeworm.com/dl/534/488288.html
下载: 185
查看: 1233

论文 CMOS MEMS_ A KEY TECHNOLOGY

The mature CMOS fabrication processes are available in many IC foundries. It is cost-effective to leverage the existing CMOS fabrication technologies to implement MEMS devices. On the other hand, the MEMS devices could also add values to the IC industry as the Moore’s law reaching its limit. The CM ...
https://www.eeworm.com/dl/522275.html
下载: 1
查看: 38

加密解密 The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption sche

The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Key Encapsulation Mech ...
https://www.eeworm.com/dl/519/238196.html
下载: 140
查看: 1090