搜索:Identity

找到约 21 项符合「Identity」的查询结果

结果 21
https://www.eeworm.com/dl/542/447172.html 其他书籍

jason bourne identity

jason bourne identity
下载 176
·
查看 1061
https://www.eeworm.com/dl/619/340403.html Linux/Unix编程

Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the rela

Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanc ...
下载 118
·
查看 1107
https://www.eeworm.com/dl/620/337887.html Internet/网络编程

HIP:Host Identity Protocol

HIP:Host Identity Protocol,主机识别协议,这个HIPL则是linux下的HIP源码。HIp为网络提供更好的安全,更高的隐私需求,也更好的支持了多播,移动性
下载 81
·
查看 1127
https://www.eeworm.com/dl/645/298725.html 其他数据库

sybase数据库中对identity的控制

sybase数据库中对identity的控制
下载 190
·
查看 1064
https://www.eeworm.com/dl/542/187371.html 其他书籍

A New Identity-based Proxy Signature Scheme from Bilinear Pairings

A New Identity-based Proxy Signature Scheme from Bilinear Pairings
下载 177
·
查看 1103
https://www.eeworm.com/dl/542/473079.html 其他书籍

A basic Fourier transform identity coupled with an iterative convergence algorithm provides a powerf

A basic Fourier transform identity coupled with an iterative convergence algorithm provides a powerful method to align band-limited signals.
下载 93
·
查看 1041
https://www.eeworm.com/dl/633/343734.html Java编程

OPIAM stands for Open Identity and Access Management. This Suite will provide modules for user & rig

OPIAM stands for Open Identity and Access Management. This Suite will provide modules for user & right centralized management: user profile management, ldap content consultation, access control based on RBAC & provisioning policies, and Web SSO.
下载 108
·
查看 1061
https://www.eeworm.com/dl/519/238196.html 加密解密

The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption sche

The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Ke ...
下载 140
·
查看 1141
https://www.eeworm.com/dl/519/447280.html 加密解密

IBE加密算法的入门文章Identity-Based Encryption from the Weil Pairing

IBE加密算法的入门文章Identity-Based Encryption from the Weil Pairing
下载 147
·
查看 1235
https://www.eeworm.com/dl/957519.html 技术资料

期刊论文:A face and fingerprint identity authentication system based&

·期刊论文:A face and fingerprint identity authentication system based on multi-route detection
下载 6
·
查看 8174