Secure CRT
共 238 篇文章
Secure CRT 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 238 篇文章,持续更新中。
Fundamental Limits on a Class of Secure
Abstract—In the future communication applications, users<br />
may obtain their messages that have different importance levels<br />
distributively from several available sources, such as distributed<
扫描线发生器
玩老游戏机用,让液晶有crt的感觉。当然,最终效果跟crt还是有差别的。
构造是在两片平行的玻璃当中放置液态的晶体
构造是在两片平行的玻璃当中放置液态的晶体,两片玻璃中间有许多垂直和水平的细小电线,透过通电与否来控制杆状水晶分子改变方向,将光线折射出来产生画面。比CRT要好的多,但是价钱较其贵
this is the document for the secure development in java. It covers in very good details the aspect o
this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java
What happens with your machine when you need to move away from the computer for 10 or more minutes?
What happens with your machine when you need to move away from the computer for 10 or more minutes? How secure is your data? Can someone sit on your chair while you are at a coworkers office and play
JPEG 2000 image coding system — Part 8: Secure JPEG 2000
JPEG 2000 image coding system — Part 8:
Secure JPEG 2000
A certification path is an ordered list of certificates starting with a certificate issued by the re
A certification path is an ordered list of certificates starting with a certificate issued by the relying
party s trust root, and ending with the target certificate that needs to be validated. Certif
QualNet Sensor Networks Library QualNet’s new Sensor Networks Library is a much awaited feature
QualNet
Sensor Networks
Library
QualNet’s new Sensor Networks Library is a much
awaited feature set that supports the IEEE 802.15.4
standard, otherwise known as Zigbee. Zigbee
networks are Wirel
sah-1(Secure Hash Algorithm,安全散列算法)算法源程序
sah-1(Secure Hash Algorithm,安全散列算法)算法源程序
journal of Secure Distributed Source Coding with Side-Information
journal of Secure Distributed Source Coding with Side-Information
good document about secure REST
good document about secure REST
This application note describes the design and implementation of a usb mass storage devic using a se
This application note describes the design and implementation of a usb mass storage devic using a secure digital card,which should prove useful to developers of usb mass storage solution.This
applica
Spread-spectrum techniques are methods by which electromagnetic energy generated in a particular ban
Spread-spectrum techniques are methods by which electromagnetic energy generated in a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth.
VGA彩色信号控制器设计:用VHDL语言编写程序
VGA彩色信号控制器设计:用VHDL语言编写程序,重点完成三个功能:
1.棋盘格图案显示:
用三基色原理在CRT显示器上显示由横竖八彩条重叠构成的棋盘格图案;
2.在显示器上依次显示0~9十个数字:
每个数字不同颜色,每个显示大约0.4秒,循环显示;
3.显示动画效果:
将静态图像以高频率显示,造成动画效果,最终动态显示OVER结束。
URL programming. This example illustrates using a URL to access resources on a secure site.
URL programming. This example illustrates using a URL to access resources
on a secure site.
description of evoting protocols to be implemented via very secure codes and its bugs and full revie
description of evoting protocols to be implemented via very secure codes and its bugs and full reviews.
VideoInOut for CRT Monitor BF561
VideoInOut for CRT Monitor BF561
S60V2版短信漏洞补丁ortiCleanUp_CurseSMS_103这条不到10个字符短信成功利用了SymbianOS的漏洞
S60V2版短信漏洞补丁ortiCleanUp_CurseSMS_103这条不到10个字符短信成功利用了SymbianOS的漏洞,使用者收到这条短信后,就再也无法打开短信收件箱功能,并可能频繁死机。由于这条短信谁都能发,所以诺基亚所有N系列智能手机、E系列智能手机都将遭遇有史以来最严重的安全威胁。目前还没有发布相关的补丁。如果你尚未中招,建议安装诺基亚和F-Secure推出的保护程序,直到诺基亚推
This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly
MCF5223XFS
Connecting 32-bit controlled applications<br />
in the industrial, commercial and consumer<br />
markets is fast becoming a necessity rather<br />
than an option. Many new applications, such<br />
as