Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • gggPerisHER-2006-pwc.rar RFID Systems: A Survey on Security Threats and Proposed Solutions
  • Caeseer.rar Caseer: security algorithm Used for security of strings , messages and etc.
  • Network_Security_Technical_Analysis.rar 网络安全问题技术解析 网络安全问题技术解析 Network Security Technical Analysis
  • an_intellegent_audio_water_marking_based_on_dwt-s ... the optimal intensity of audio watermarking by using the ATS. Experimental results show that the watermarking method performs well in both security and robustness to many digital signals processing, such as filtering, cropping, mp3 and random noise.
  • 132.rar ... benign environment. The communication system must handle both situations. Security attacks can be launched towards any layer of the ... layer routing information as a more probable target for security attacks. A reliable network service cannot be provided ...
  • Zigbee.rar ZigBee, Stack, Network, Application, Profile, Framework, Device description, Binding, Security
  • crypoprocessor.rar ... of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms. This crypto processor can be used for various security applications such as storage devices, embedded systems, network routers, etc.
  • Sha1.zip Implemmentation of SHA-256 in Java using java.security.MessageDigest
  • TheGovernmentNetworkSecuritySolutions.rar The Government Network Security Solutions
  • aes-byte-29-08-08.zip Aes code for security with c++ source code