搜索结果
找到约 12 项符合
Privacy 的查询结果
按分类筛选
加密解密 PGP—Pretty Good Privacy
PGP—Pretty Good Privacy,是一个基于RSA公匙加密体系的邮件加密软件。可以用它对你的邮件保密以防止非授权者阅读,它还能对你的邮件加上数字签名从而使收信人可以确信邮件是你发来的。它让你可以安全地和你从未见过的人们通讯,事先并不需要任何保密的渠道用来传递密匙。它采用了:审慎的密匙管理,一种RSA和传统加密的杂 ...
文件格式 WAPI是WLAN Authentication and Privacy Infrastructure的英文缩写。
WAPI是WLAN Authentication and Privacy Infrastructure的英文缩写。
行业发展研究 a ppt file describe privacy protected visual surveillance , a survey of all existed methods on prova
a ppt file describe privacy protected visual surveillance , a survey of all existed methods on provacy preserving visual surveillance
其他书籍 this book is about the concerns about RFiD security and privacy and includes solutions.
this book is about the concerns about RFiD security and privacy and includes solutions.
语音压缩 明成Download latest audio/video codecs & tools: http://www.free-codecs.com Download Security & Pri
明成Download latest audio/video codecs & tools:
http://www.free-codecs.com
Download Security & Privacy Tools:
http://www.scanwith.com
Only FREE Downloads:
http://www.click-now.net
Linux/Unix编程 Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the rela
Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanced network concepts, ...
RFID编程 RFID, the wireless technology that has helped millions of people around the world to protect their
RFID, the wireless technology that has helped
millions of people around the world to protect their property and
make their workplaces safer is now in danger of being viewed as a
security risk. Ray Stanton examines the love-hate relationship
between people and Radio Frequency Identification [RFID] ta ...
加密解密 An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of th
An Introduction To Cryptography
Chapter 1, “The Basics of Cryptography,” provides an overview of the
terminology and concepts you will encounter as you use PGP products.
Chapter 2, “Phil Zimmermann on PGP,” written by PGP’s creator, contains
discussions of security, privacy, and the vulnerabili ...
书籍 Cyber-Physical Systems
This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of i ...
技术资料 an-introduction-to-rfid-technology
RFID is at a critical price point that could enable its large-scale adoption.
What strengths are pushing it forward? What technical challenges and
privacy concerns must we still address?