CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 文档资料

资源列表

« 1 2 ... .74 .75 .76 .77 .78 15679.80 .81 .82 .83 .84 ... 16321 »
  1. C_File_Processing

    0下载:
  2. C File Processing(basic c programming)
  3. 所属分类:Document

    • 发布日期:2017-04-16
    • 文件大小:13.39kb
    • 提供者:温耀文
  1. C_Selection_Structure

    0下载:
  2. C Selection Structure(basic c programming)
  3. 所属分类:Document

    • 发布日期:2017-04-25
    • 文件大小:101.51kb
    • 提供者:温耀文
  1. 123

    0下载:
  2. 电路板设计中差分信号线布线的优点和布线策略-abcdefg
  3. 所属分类:Document

    • 发布日期:2017-04-05
    • 文件大小:21.36kb
    • 提供者:sunny
  1. CryptanalysisofHwang-ChangsaTime-StampProtocolforD

    0下载:
  2. Cryptanalysis of Hwang-Changs a Time-Stamp Protocol for Digital Watermarking-In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit watermarking. They claimed that their scheme is secure against attacks. However, in this article,
  3. 所属分类:Document

    • 发布日期:2017-04-01
    • 文件大小:386.57kb
    • 提供者:xiaowang
  1. OnDesignatedlyVerifiedNon-interactive)Watermarking

    0下载:
  2. On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is a possible solution for this
  3. 所属分类:Document

    • 发布日期:2017-03-23
    • 文件大小:141.57kb
    • 提供者:xiaowang
  1. FromWeaktoStrongWatermarking

    0下载:
  2. From Weak to Strong Watermarking-The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the conte
  3. 所属分类:Document

    • 发布日期:2017-04-16
    • 文件大小:305.89kb
    • 提供者:xiaowang
  1. CryptanalysisofaNewChaoticCryptosystemBasedonErgod

    0下载:
  2. Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity-This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack.
  3. 所属分类:Document

    • 发布日期:2017-04-01
    • 文件大小:173.17kb
    • 提供者:xiaowang
  1. Cryptanalysisofanimageencryptionscheme

    0下载:
  2. Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed
  3. 所属分类:Document

    • 发布日期:2017-04-04
    • 文件大小:245.79kb
    • 提供者:xiaowang
  1. UsingvisualtagstobypassBluetoothdevicediscovery.ra

    0下载:
  2. Using visual tags to bypass Bluetooth device discovery.-One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth
  3. 所属分类:Document

    • 发布日期:2017-03-29
    • 文件大小:195.69kb
    • 提供者:nihao
  1. HandoffsupportformobilitywithIPoverBluetooth

    0下载:
  2. Handoff support for mobility with IP over Bluetooth-One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth conn
  3. 所属分类:Document

    • 发布日期:2017-04-09
    • 文件大小:1mb
    • 提供者:wang
  1. InterferenceevaluatioofBluetoothandIEEE802.11bsyst

    0下载:
  2. Interference evaluation of Bluetooth and IEEE 802.11 b systems-The emergence of several radio technologies, such as Bluetooth and IEEE 802.11, operating in the 2.4 GHz unlicensed ISM frequency band, may lead to signal interference and result
  3. 所属分类:Document

    • 发布日期:2017-03-30
    • 文件大小:190.71kb
    • 提供者:nihao
  1. MultihopscatternetformationforBluetoothnetworks1.r

    0下载:
  2. Multihop scatternet formation for Bluetooth networks-Bluetooth Paper:Multihop scatternet formation for Bluetooth networks
  3. 所属分类:Document

    • 发布日期:2017-04-05
    • 文件大小:460.39kb
    • 提供者:wang
« 1 2 ... .74 .75 .76 .77 .78 15679.80 .81 .82 .83 .84 ... 16321 »
搜珍网 www.dssz.com