资源列表
sapphire1
- 一个完整的加密算法,有兴趣的可以看看一个完整的加密算法,有兴趣的可以-A complete encryption algorithm, interested can see a complete encryption algorithm, interested to see
secshare1
- 一个完整的加密算法,有兴趣的可以看看一个完整的加密算法,有兴趣的可以-A complete encryption algorithm, interested can see a complete encryption algorithm, interested to see
secsplit1
- 一个完整的加密算法,有兴趣的可以看看一个完整的加密算法,有兴趣的可以-A complete encryption algorithm, interested can see a complete encryption algorithm, interested to see
sha1
- 一个完整的加密算法,有兴趣的可以看看一个完整的加密算法,有兴趣的可以-A complete encryption algorithm, interested can see a complete encryption algorithm, interested to see
tiger1
- 一个完整的加密算法,有兴趣的可以看看一个完整的加密算法,有兴趣的可以-A complete encryption algorithm, interested can see a complete encryption algorithm, interested to see
wake1
- 一个完整的加密算法,有兴趣的可以看看一个完整的加密算法,有兴趣的可以-A complete encryption algorithm, interested can see a complete encryption algorithm, interested to see
ImageToBianry
- It converts the Image to Binary data. it is very useful at the time of encryption of image.
12
- 给文件进行压缩加密和解密,保证文件的安全。-To encrypt and decrypt compressed files to ensure file security.
MD5
- 用Microsoft Visual Basic编写的MD5加密例子-Written using Microsoft Visual Basic examples of MD5 encryption
chaos_communication1
- 在两个混沌系统实现单变量驱动耦合同步情况下,采用混沌遮掩的加密方式,实现混沌保密通信,-Two chaotic systems synchronize single variable drive coupling case, the use of chaos cover of encryption, Secure Communication,
5_attractor_sync1
- 采用主动-被动的同步方案实现两个具有5涡卷蔡氏混沌电路系统同步-By active- passive synchronization scheme to achieve the two Chua' s chaotic circuit with five scroll synchronization
2286
- Similar to many technological developments, wireless sensor networks have emerged from military needs and found its way into civil applications. Today, wireless sensor networks has become a key technology for different types of ”smart environme
