搜索资源列表
WEB-based--certificates
- 在WEB应用中使用基于数字证书的登录验证-Login authentication using digital certificates in the WEB-based applications
1224
- 中国联通增值业务鉴权中心接口规范-VAC与SP接口规范-China unicom value-added service interface specification authentication center- VAC and SP interface specification Digital cellular mobile communication network Multimedia message sample business development
ear-report
- this the document of ear authentication to da a project.-this is the document of ear authentication to da a project.
1
- 智能卡电子钱包程序,完成存款,取款,身份验证等基本功能-Smart card electronic purse program, completed deposits, withdrawals, authentication, and other basic functions
overvieRecongnition
- 模式识别,身份认证,生物特征识别综述。matlab实现VQ的说话人识别-Pattern recognition, authentication, biometrics Review
mschart
- c#下图表控件的使用例子,经过验证可用,可以放心下载。-The c# chart control the use of examples, can be used after authentication, you can rest assured that download.
HZZ_LANHAI
- 海蜘蛛与蓝海卓越认证计费对接说明,内容全面,对接方法简单!- ON划词翻译ON实时翻译 Sea spiders and the blue ocean of excellence of authentication and accounting docking instructions
chahua3392
- 登陆验证,判断你的身份。正确的登录方式,正确的选择权。- Login authentication
PROJECT-WITH-AUTHENTICATION-1-(1)
- this program used to purchase automobile parts for your car.this program cover 5 modules: register, login, order, banking and report generation
AAA-Authentication
- Useful to configure -Useful to configure AAA
Design-and-Analysis-of-a-Highly-User-Friendly
- Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method
SM3.pdf
- 用途 国家密码管理局编制的商用算法,用于密码应用中的数字签名和验证、消息认证码的生成与验证以及随机数的生成,可满足多种密码应用的安全需求。 算法描述 对长度为l(l< 2^64) 比特的消息m,SM3杂凑算法经过填充和迭代压缩,生成杂凑值,杂凑值长度 为256比特。-Use Commercial management algorithm, compiled by the Bureau of national code, used to generate th
RF_technology
- NFC MIFARE FELICA S50 S70 P2P ID卡 动物标签 18092 14443 技术详细介绍 (1)——概念、分类 (2)——国际标准 (3)——能量、调制 (4)——数据编码 (5)——防冲突 (6)——通讯协议概述 (7)——ID卡 (8)——动物标签 (9)——动物标签HDX (10)——识别号的格式变化 (11)——Mifare系列卡的共性 (12)——三次相互认证 (13)——Mifare S50与Mifare
06482410
- LTE s success a high throughput, low latency, and umbrella technology for wireless heterogeneous networks is highly affected by the researchers capability of solving its current security vulnerabilities. Mutual authentication was adopted by mobile ne
DESCRIPTION-PROCESS
- In this project we are making one cloud computing secure storage using networking concept, in this we have three modules-1.TPA(third party authentication),2.different cloud for using the services and 3.client to use the service cloud. We are going to
iPod_Authentication_Coprocessor_Spec_2.0B_R4.pdf.
- ipod authentication corpocessor spec
23401-d10
- The present document defines the Stage 2 service descr iption for the Evolved 3GPP Packet Switched Domain - also known as the Evolved Packet System (EPS) in this document. The Evolved 3GPP Packet Switched Domain provides IP connectivity using the Evo
24302-d00
- The present document specifies the discovery and network selection procedures for access to 3GPP Evolved Packet Core (EPC) via non-3GPP access networks and includes Authentication and Access Authorization using Authentication, Authorization and Accou
literature-survey
- This file is a literature survey of password authentication
literature-surveyn
- Survey on image authentication steps