SECURE
共 114 篇文章
SECURE 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 114 篇文章,持续更新中。
xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661). L2TP allows you to tunne
xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661).
L2TP allows you to tunnel PPP over UDP. Some ISPs use L2TP to tunnel user
sessions from dial-in servers (modem banks, ADSL
PeerSec Networks MatrixSSL?is an embedded SSL implementation designed for small footprint applicatio
PeerSec Networks MatrixSSL?is an embedded SSL implementation designed for small footprint applications and devices. PeerSec Networks offers a fully supported, commercial version as well as an open sou
Secure Lecture Source
Secure Lecture Source
This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly
this is the secure socket example seee it
this is the secure socket example seee it
Java technology is both a programming language and a platform. The Java programming language origina
Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices
Tiny Encryption Algorithm for secure communication.
Tiny Encryption Algorithm for secure communication.
SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384,
SHA Hash algorithm.
This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA-
512.
Digital Signature Algorithm (DSA)是Schnorr和ElGamal签名算法的变种
Digital Signature Algorithm (DSA)是Schnorr和ElGamal签名算法的变种,被美国NIST作为DSS(DigitalSignature Standard)。算法中应用了下述参数:
p:L bits长的素数。L是64的倍数,范围是512到1024;
q:p - 1的160bits的素因子;
g:g = h^((p-1)/q) mod p,h满足h
SHA-1(Secure Hash Algorithm)是美国国家标准局(National Institute of Standard and Technology NIST)为了配合数位签章演算法(
SHA-1(Secure Hash Algorithm)是美国国家标准局(National Institute of Standard and Technology NIST)为了配合数位签章演算法(Digital Signature Algorithm DSA)的使用所发布的联邦资讯处理标准-FIPS PUB 180-1(Federal Information Processing Standa
C++ methods to write ecash procedures in a secure way also containded with are description of the pr
C++ methods to write ecash procedures in a secure way also containded with are description of the protocols.
Java Secure Shell Channel Library.
Java Secure Shell Channel Library.
Atmel’s AT91SAM7FP105 is a low pincount FingerChip processor based on the 32-bit ARM RISC processor
Atmel’s AT91SAM7FP105 is a low pincount FingerChip processor based on the 32-bit ARM
RISC processor. It features a on-chip biometric engine performing enrollment verification and
identification, an
What you always wanted to know about networking but were afraid to ask! * How networks and the In
What you always wanted to know about networking but were afraid to ask!
* How networks and the Internet work
* How to build coherent, cost-effective network infrastructures
* How to design networ
this is the secure socket example seee it
this is the secure socket example seee it
AVR Secure Digital Card and Multimedia card sample code
AVR Secure Digital Card and Multimedia card sample code
CCSP_Cisco_Secure_PIX防火墙配置、考试用书。
CCSP_Cisco_Secure_PIX防火墙配置、考试用书。
this is tutorial for ipchains/iptables . how to make ur system secure using them. how to enchance th
this is tutorial for ipchains/iptables . how to make ur system secure using them. how to enchance them.
this is the document for the secure development in java. It covers in very good details the aspect o
this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java
OpenSSH 是 SSH (Secure SHell) 协议的免费开源实现。它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。OpenSSH 支持
OpenSSH 是 SSH (Secure SHell) 协议的免费开源实现。它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。OpenSSH 支持 SSH 协议的版本 1.3、1.5、和 2。