Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - cryptography
Search - cryptography - List
DL : 0
Cryptography Concept
Update : 2024-05-18 Size : 9216 Publisher : Shaikha

Introduction to Cryptography with Mathematical Foundations and Computer Implementations Alexander Stanoyevitch code sources
Update : 2024-05-18 Size : 316416 Publisher : mohammed ibra

Watermarking using cryptography
Update : 2024-05-18 Size : 61440 Publisher : FREELANCER

DL : 0
使用 System.Security.Cryptography 对字符串加密解密, 可用于各类口令加密-Use System.Security.Cryptography encryption and decryption of the string, can be used for all kinds of password encryption
Update : 2024-05-18 Size : 1031168 Publisher : 唐源

Cryptography in C and C++ by Welschenbach
Update : 2024-05-18 Size : 1337344 Publisher : Sima Das

Zigbee file transfer using cryptography
Update : 2024-05-18 Size : 1024 Publisher : Ravindra

DL : 0
古典密码的实现,包括Caesar、playfair、polyalphabetic、rotormachine等基本实现-the implementation of some ancient cryptography ,including caesar 、playfair、polyalphabetic and rotormachine
Update : 2024-05-18 Size : 2386944 Publisher : Nils

DL : 0
密码学原理的经典资料,翻译的最经典的外文书籍-The principles of classical cryptography, translation of the most classic of English books
Update : 2024-05-18 Size : 21869568 Publisher : 王东

Book: The laws of cryptography with Java code Author: Wagner Year: 2003
Update : 2024-05-18 Size : 988160 Publisher : Leonardo

DL : 0
应用密码学:协议、算法与C源程序,适合初学者已经有兴趣的一起学习 研究-Applied Cryptography: Protocols, Algorithms and C source code, suitable for beginners have been interested in learning to study together
Update : 2024-05-18 Size : 20310016 Publisher : liushunchao

Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. cryptography is about constructing and analyzing protocols that prevent third parties or the public reading private messages various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography.-Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. cryptography is about constructing and analyzing protocols that prevent third parties or the public reading private messages various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography.
Update : 2024-05-18 Size : 10075136 Publisher : Nisha Pal

是密码学领域的经典著作,被世界上的多所大学用作指定教科书-Is a classic in the field of cryptography, is used as the designated textbook in many universities in the world
Update : 2024-05-18 Size : 12055552 Publisher : denis dai

Most areas of computer science focus on achieving functionality: putting some system together and making it work. By contrast, security and cryptography focus on achieving functionality in the presence of an attacker. With the emergence of e-crime as an important threat on the Internet, an understanding of security is crucial for every system developer. UC San Diego s cryptography and security group numbers ten faculty and two dozen graduate students, and works on topics ranging the mathematical foundations of cryptography to practical security analyses of voting machines and automobiles. For more about the group and our research, visit our Web page. Many of us are looking for undergraduate research assistants let us know if you are interested in research.-Most areas of computer science focus on achieving functionality: putting some system together and making it work. By contrast, security and cryptography focus on achieving functionality in the presence of an attacker. With the emergence of e-crime as an important threat on the Internet, an understanding of security is crucial for every system developer. UC San Diego s cryptography and security group numbers ten faculty and two dozen graduate students, and works on topics ranging the mathematical foundations of cryptography to practical security analyses of voting machines and automobiles. For more about the group and our research, visit our Web page. Many of us are looking for undergraduate research assistants let us know if you are interested in research.
Update : 2024-05-18 Size : 11180032 Publisher : khushboo

Elliptic Curve Cryptography的技術文件說明檔-Elliptic Curve Cryptography Technical Document File
Update : 2024-05-18 Size : 335872 Publisher : Chun Fang Lee

cryptography and information security
Update : 2017-03-16 Size : 1541808 Publisher : subashree

cryptography based on logical matrices scrambling
Update : 2024-05-18 Size : 1083392 Publisher : josh

Ebook For Java Cryptography by Jonathan B. Knudsen
Update : 2024-05-18 Size : 1391616 Publisher : Rishabh

INTRODUCTION TO CRYPTOGRAPHY WITH JAVA APPLETS - DAVID BISHOP
Update : 2024-05-18 Size : 6515712 Publisher : Rishabh

cryptography software for vigener algorithm
Update : 2024-05-18 Size : 4781056 Publisher : yousefzadeh

Bruce Schneier\Applied Cryptography (527)
Update : 2024-05-18 Size : 1939456 Publisher : Webbo32
« 1 2 ... 9 10 11 12 13 1415 16 17 18 19 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.