搜索结果
找到约 12,507 项符合
A-Key 的查询结果
CA认证 在cdma2000移动通信系统中使用A-Key实现空中接口部分无线接入的身份验证和加密密钥的产生。
在cdma2000移动通信系统中使用A-Key实现空中接口部分无线接入的身份验证和加密密钥的产生。
Delphi控件源码 Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite
Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite handy with INI files which you can use to get and set data for you applications. You can also check out some dates related to passwords and expiry dates. Send emails using Microsoft Email client. No n ...
压缩解压 EZW coding implementation. using wavelet transforms as a key tool. compression and decoding is done
EZW coding implementation. using wavelet transforms as a key tool. compression and decoding is done using EZW algorithm.
压缩解压 EZW coding implementation. using wavelet transforms as a key tool. compression and decoding is done
EZW coding implementation. using wavelet transforms as a key tool. compression and decoding is done using modified EZW algorithm.
压缩解压 SPIHT coding implementation. using wavelet transforms as a key tool. compression and decoding is don
SPIHT coding implementation. using wavelet transforms as a key tool. compression and decoding is done using SPIHT algorithm.
软件设计/软件工程 Learn how to leverage a key Java technology used to access relational data from Java programs, in
Learn how to leverage a key Java technology used to access
relational data from Java programs, in an Oracle environment.
Author Donald Bales begins by teaching you the mysteries of
establishing database connections, and how to issue SQL queries
and get results back. You ll move on to advanced to ...
驱动编程 Driver Virtual keyboard. Allows you to create programs that need to send a key to bypass Win32. Suit
Driver Virtual keyboard. Allows you to create programs that need to send a key to bypass Win32. Suitable for games where prohibited send key.
其他 memcat - Copy the value of a key to standard output memflush - Flush the contents of your servers.
memcat - Copy the value of a key to standard output
memflush - Flush the contents of your servers.
memrm - Remove a key(s) from the server.
memstat - Dump the stats of your servers to standard output
memslap - Load generation utility (benchmark!)
论文 CMOS MEMS_ A KEY TECHNOLOGY
The mature CMOS fabrication processes are available
in many IC foundries. It is cost-effective to leverage the
existing CMOS fabrication technologies to implement
MEMS devices. On the other hand, the MEMS devices
could also add values to the IC industry as the Moore’s law
reaching its limit. The CM ...
加密解密 The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption sche
The Stanford IBE library is a C implementation of the Boneh-Franklin
identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based
Encryption from the Weil Pairing", CRYPTO 2001.)
There are a few modifications and additions. The Boneh-Franklin scheme is
used as a Key Encapsulation Mech ...