-
-
-
Caeseer.rar
Caseer: security algorithm
Used for security of strings , messages and etc.
-
-
an_intellegent_audio_water_marking_based_on_dwt-s
...
the optimal intensity of audio watermarking by using the
ATS. Experimental results show that the watermarking
method performs well in both security and robustness to
many digital signals processing, such as filtering,
cropping, mp3 and random noise.
-
132.rar
... benign environment. The communication system must handle
both situations. Security attacks can be launched towards any layer of the ... layer routing
information as a more probable target for security attacks. A reliable network service
cannot be provided ...
-
Zigbee.rar
ZigBee, Stack, Network, Application, Profile, Framework, Device description, Binding,
Security
-
crypoprocessor.rar
... of a crypto processor, a special-purpose
microprocessor optimized for the execution of
cryptography algorithms. This crypto processor can be used
for various security applications such as storage devices,
embedded systems, network routers, etc.
-
Sha1.zip
Implemmentation of SHA-256 in Java using java.security.MessageDigest
-
-
-