搜索资源列表
1. A fast video encryption scheme based-on chaos.
- 这是一篇有关混沌在视频中加密的文章,题目为:A fast video encryption scheme based-on chaos。不过看看懂还是要花一些时间的,不过我可以和大家交流。还有这是英文作写。-This is a chaos in the video encryption article entitled : A fast encryption scheme based video-on chaos. But look at to understand or take some t
hsh-gen(HTTP-Based-Command-Line).tar
- a http shell generator. HTTP based command line. Security tool. writen in perl.-a http shell generator. HTTP based command line. Security tool. writen in perl.
PCA-SIFT
- 一个基于matlab语言的编程,可以实现对人脸的识别算法-A matlab-based programming language can be achieved on the human face recognition algorithm
Ibe_dec
- IBE基于身份的加密系统的解密程序,使用VC6.0开发-IBE identity-based encryption system of the decryption process, using VC6.0 Development
ids
- 作者自己修改的一个基于网络的入侵检测系统-The author himself revised a web-based Intrusion Detection System
Embedded-Bluetooth-based-ordering-system
- 基于蓝牙的嵌入式点菜系统,在linux操作系统QT编程 开发平台下-Embedded Bluetooth-based ordering system, linux operating system platform QT Programming
cpabe-0.7.tar
- ABE加密(Attribute-Based Encryption)算法的一种实现方案-Source code for ABE(Attribute-Based Encryption)
ibe.tar
- IBE加密算法的入门文章Identity-Based Encryption from the Weil Pairing-IBE encryption algorithm of the article Introduction to Identity-Based Encryption from the Weil Pairing
route
- 一段基于虚拟簇的路由协议代码。用于无线传感器网络-A virtual cluster based routing protocol code. For wireless sensor networks
player
- MiniGui下音乐播放器的实现,可以播放以.mp3结尾的音乐文件-the player code based on MiniGui.
Ibe_ext
- IBE基于身份的加密系统的身份提取程序,使用VC6.0开发,即把身份转换成椭圆曲线上的点-IBE identity-based encryption system of the identity of extraction procedures, using VC6.0 development, namely, the identity into a point on the elliptic curve
Linux-zero-based-junior-tutorial
- 如果希望能在短时间里对linux有个全面的理解,并且希望能迅速掌握LInux基本功能,那这本书将是相当不错的选择:Linux零基础初级教程.pdf-If you want to be able to right in a short time have a comprehensive understanding of linux and would like to be able to quickly master the basic functions of LInux, then this
an_intellegent_audio_water_marking_based_on_dwt-s
- All three, Discrete Wavelet Transform (DWT) - Singular Value Decomposition (SVD) and Adaptive Tabu Search (ATS) have been used as mathematical tools for embedding data into an audio signal. In this paper, we present a new robust audio waterma
lsb_crypt
- steganography based on lsb substitution along with encryption
pbc-0.5
- pairing-based cryptography,The Ecc cryptography,now so many people is learn to use pairing-based cryptography,this is used in window
protocol-anomaly-detection-network-based-intrusio
- A taxonomy was developed by Axelsson to define the space of intrusion detection technology and classify IDSs. The taxonomy categorizes IDSs by their detection principle and their operational aspects. The two main categories of detection principle
Based-on-the-automotive-industry-value-chain-analy
- 基于价值链的汽车产业供应链协同管理分析Based on the automotive industry value chain analysis of Collaborative Supply Chain Management-Based on the automotive industry value chain analysis of Collaborative Supply Chain Management
Based-on-Canonical-Correlation-Analysis-and-low-pa
- 基于典型相关分析与低通滤波的肌电伪迹去除Based on Canonical Correlation Analysis and low-pass filter to remove EMG artifacts-Based on Canonical Correlation Analysis and low-pass filter to remove EMG artifacts
Based-on-real-eigenvalue-decomposition-algorit
- 基于实值特征值分解的求根MUSIC算法Based on real eigenvalue decomposition algorithm for finding roots of MUSIC-Based on real eigenvalue decomposition algorithm for finding roots of MUSIC
Optimization-based-on-traffic-studies-distributed-
- 基于通信量优化的分布式组件部署策略的研究Optimization based on traffic studies distributed component deployment strategy-Optimization based on traffic studies distributed component deployment strategy
