CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 文档资料

资源列表

  1. C_Loop_Structure

    0下载:
  2. C Loop Structure(basic c programming)
  3. 所属分类:Document

    • 发布日期:2017-04-17
    • 文件大小:52.81kb
    • 提供者:温耀文
  1. C_array

    0下载:
  2. c array(basic c programming)
  3. 所属分类:Document

    • 发布日期:2017-04-24
    • 文件大小:13.77kb
    • 提供者:温耀文
  1. C_Array_And_String

    0下载:
  2. C Array And String(basic c programming)
  3. 所属分类:Document

    • 发布日期:2017-04-09
    • 文件大小:14.43kb
    • 提供者:温耀文
  1. C_File_Processing

    0下载:
  2. C File Processing(basic c programming)
  3. 所属分类:Document

    • 发布日期:2017-04-16
    • 文件大小:13.39kb
    • 提供者:温耀文
  1. C_Selection_Structure

    0下载:
  2. C Selection Structure(basic c programming)
  3. 所属分类:Document

    • 发布日期:2017-04-25
    • 文件大小:101.51kb
    • 提供者:温耀文
  1. 123

    0下载:
  2. 电路板设计中差分信号线布线的优点和布线策略-abcdefg
  3. 所属分类:Document

    • 发布日期:2017-04-05
    • 文件大小:21.36kb
    • 提供者:sunny
  1. CryptanalysisofHwang-ChangsaTime-StampProtocolforD

    0下载:
  2. Cryptanalysis of Hwang-Changs a Time-Stamp Protocol for Digital Watermarking-In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit watermarking. They claimed that their scheme is secure against attacks. However, in this article,
  3. 所属分类:Document

    • 发布日期:2017-04-01
    • 文件大小:386.57kb
    • 提供者:xiaowang
  1. OnDesignatedlyVerifiedNon-interactive)Watermarking

    0下载:
  2. On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is a possible solution for this
  3. 所属分类:Document

    • 发布日期:2017-03-23
    • 文件大小:141.57kb
    • 提供者:xiaowang
  1. FromWeaktoStrongWatermarking

    0下载:
  2. From Weak to Strong Watermarking-The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the conte
  3. 所属分类:Document

    • 发布日期:2017-04-16
    • 文件大小:305.89kb
    • 提供者:xiaowang
  1. CryptanalysisofaNewChaoticCryptosystemBasedonErgod

    0下载:
  2. Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity-This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack.
  3. 所属分类:Document

    • 发布日期:2017-04-01
    • 文件大小:173.17kb
    • 提供者:xiaowang
  1. Cryptanalysisofanimageencryptionscheme

    0下载:
  2. Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed
  3. 所属分类:Document

    • 发布日期:2017-04-04
    • 文件大小:245.79kb
    • 提供者:xiaowang
  1. UsingvisualtagstobypassBluetoothdevicediscovery.ra

    0下载:
  2. Using visual tags to bypass Bluetooth device discovery.-One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth
  3. 所属分类:Document

    • 发布日期:2017-03-29
    • 文件大小:195.69kb
    • 提供者:nihao
搜珍网 www.dssz.com