搜索资源列表
3833.Desfire-ev1-t-commands-P-authentication-proc
- pdf describe commands mifare desfire
A-Fragile-Watermarking-Scheme-for-Image-Authentic
- A Fragile Watermarking Scheme for Image Authentication with Tamper
Voting-System-(1)
- Secure unique code identification for Voting System using Multitouch gesture Authentication-Secure unique code identification for Voting System using Multitouch gesture Authentication
EEG-for-biometrics
- Biometric recognition is the science of establishing the identity of a person using his/her physical or biological characteristics. Biometric systems can employ different kinds of features, e.g., features of fingerprint, face, iris or posture. EEG si
SURVEY-AUTHENTICATION-AND-KEY-DISTRIBUTION-SCHEME
- it is a document that describe key management in wireless sensor network
CAcertificate
- 数字证书认证系统培训资料文档,doc版,内容很好-Digital certificate authentication system documentation training materials, doc version, good content
04721349
- Speech Based Watermarking for Digital Images This paper presents a novel scheme of watermarking of digital images for copyright protection and authentication. In this paper we proposed a method of embedding owner’s speech signal. Speech being
demo
- 几个简单的小例子,js的用户等等的验证,当然其中也有不足-A few simple small example, js user authentication and so on, of course, there are drawbacks
1004
- 协成认证页面新模板协成WIFI智能营销系统-Society as a new template authentication page hyopsung WIFI Smart Retail System
paper3
- 一种基于Hash函数和分组密码的消息认证码.pdf-A Hash functions and block cipher-based message authentication code
Key-Exchange-and-Identity
- 一种基于智能卡的会话密钥交换和认证方案. 基于RSA 算法的安全性和求解离散对数问题的困难性,给出一种将密钥交换和身份认证有 效结合的会话密钥管理方案,并对其安全性进行了分析-A Scheme for the Session Key Exchange and Identity Authentication Based on Smart Card
User_Guide_Version_01.00_090915.pdf
- Digital Tachograph User guide for remote company card authentication and remote data downloading
SAT A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks (2011)
- Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been exte
Preventing-Method-Of-Wormhole-Attack
- we introduce many types of attack. In many types of attack wormhole attack is more dangerous attack for network because it is very hard to detect. We discussed about a wormhole attack & its models and types. This survey introduces different wormhole
EMV-4.3e
- EMV4.3e文档,金融pos机EMV内核认证协议文档-EMV4.3e document,Financial pos EMV kernel authentication protocol document
06748095
- A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs
454168435
- 本论文主要介绍了在ad hoc 网络中密钥管理及节点认证的研究方法-This paper introduces the research method in a mobile Ad Hoc node in the secret key management and authentication
user
- 统一用户目录管理。基于LDap或数据库,对组织机构中所有应用实行统一的用户信息存储,认证和管理 -Unified user directory management. Based LDap or for all applications in the organization of a unified user information storage, authentication and management
ecc
- 对现有的一些基于 ECC 的 认证协议进行了简要的分析,并指出了其中的安全漏洞。提出了一种改进的基于 的 RFID 双向认证协议,并且对该改进协议进行了安全分析和仿真实现。 -Some of the existing authentication protocol based on ECC is briefly analyzed, and points out the security loophole. An improved two-way authentication protocol
Seminar-report
- A seminar for Single Sign On Authentication on Web