搜索资源列表
New-WinRAR-ZIP-archive-(2)
- project in wsn wit e-project in wsn wit ecc
WCS-ispacs-2012-CR-v2
- This paper presents a two-factor authentication with key agreement scheme for web-based collaborative systems. The proposed mechanism integrates URI fragment identifier with secure email token and identity-based remote mutual authentication schem
extract
- ECC Cryptography book ! Hope you Will enjoy reading it
ECC
- Detailed explanation of Error correction codes
ecc
- used to achieve the sha1 encryption algorithm, a very standardized format, a standard procedure
bch_encoder_decoder
- 一篇介绍美光BCH纠错的编解码的文档,挺好的-a document to introduce the micron s BCH ECC encoder and decoder, very nice
A-73123EN-096_01_060207
- In FS16i/18i/160i/180i/160is/180is-MODEL A and FS15i-MODEL A/B, FANUC will apply a new 3MB SRAM module to systems provided September 2005. Because FANUC adopt the ECC check function instead of the parity check function for increasing reliability
B-62175E_02-01_070816
- In FS16i/18i/160i/180i/160is/180is-MODEL A and FS15i-MODEL A/B, FANUC will apply a new 3MB SRAM module to systems provided September 2005. Because FANUC adopt the ECC check function instead of the parity check function for increasing reliability
ECC.pdf
- Error Correcting Codes in Wireless Body Area Networks
Elliptic-Curve
- ECC 椭圆曲线密码学简单介绍 入门资料-ECC Elliptic Curve Cryptography brief introductory information
fayi
- ECC是基于有限域上,椭圆曲线点集E所构成的群上定义的离散对数系统.有限域上椭圆曲线的选择,应避免使用超奇异曲线,以保证足够的安全性.椭圆曲线的运算为给定椭圆曲线E上的一个基点G和一个整数(1 1)nκκ≤≤,求数乘(mod )GQ pκ=,Q也是E上的一点,计算...GGG Gκ=+++ (κ个G相加)相对容易;但若给定椭圆曲线上两点G和Q,求一整数κ,使(mod )GQ pκ=,特别是当G是较高阶的基点时,则非常困难。这就是椭圆曲线离散对数问题。基于椭圆曲线离散对数问题的难解性,形成了ECC
coherent-optical-OFDM-with-constellation-expansio
- High-order modulation formats and advanced error correcting codes (ECC) are two promising techniques for improving the performance of ultrahigh-speed optical transport networks. In this paper, we present record receiver sensitivity for 107 Gb/s CO-
DX81-FILES11
- 防抄板、物联网安全、IP保护等解决方案 DX安全加密芯片: DX81C04: 防抄板认证 加密EEPROM存储 密钥存储、认证 设备认证 DX82C04: 防抄板认证 加密EEPROM存储 密钥存储、认证 设备认证 动态密钥产生 实时数据加密 老板、程序员、烧录工人三者文
huxinxi
- 基于互信息的图像配准算法(MI NMI ECC三种算法) matlab实现-Registration algorithm based on mutual information of images (MI, NMI, ECC three algorithms)matlab Realization
SM2椭圆曲线公钥密码算法推荐曲线参数
- SM2椭圆曲线公钥密码算法.pdf 介绍SM2算法,ecc算法(SM2 elliptic curve public key cryptography algorithm. PDF introduces SM2 algorithm, ecc algorithm)
ecc-convcodes
- Document on Convolutional codes
5G时代中国边缘计算生态的发展现状和未来趋势分析
- GSMA智库与ECC(边缘计算产业联盟)近日共同发布《5G时代的边缘计算:中国的技术和市场发展》报告,报告汇集20多家中国市场上领先的边缘计算生态相关组织和企业的深刻洞察,从技术、应用、市场前景、机会、商业模式、政策法规等多个角度,剖析了边缘计算生态的现状和未来发展。