搜索资源列表
EFSencryption
- Windows提供了加密文件的方便方法,但是一但删除帐户或重装系统,加密后的文件将再也无法解密,直接导致文件“丢失”。本文提供了一个对EFS解密的方法,值得学习。-Windows provides a convenient document encryption methods, but a deletion of accounts or reinstall system, encrypted files will no longer declassified documents directl
AdvancedEFSDataRecovery
- 解密工具,給微軟檔案系統的工具。 是在遺失加密檔案之後的工具-Decryption tool, a Microsoft file system tools. After the loss of encrypted files in a tool
mytoopad
- 可以将个人编程资料和心得进行加密存储,Windows桌面管理,搜索机器上所有的自启动程序并任意增删,优化Windows的INTERNET参数.-programming can be personal information and experiences encrypted storage, Windows desktop management, search all the machines since the commencement of the proceedings and any a
jiajiemi
- 简单的加解密,输入一段明文,通过加密程序得到密文,在通过解密程序解密得到明文-Simple encryption and decryption, enter a section of an express, through encrypted ciphertext procedures, through the decryption process at decryption been expressly
Rabin-Miller
- RSA的最重要特色在于双密钥,它们有特殊的数学形式。RSA的一对密钥有三个基本参数:模n ,公钥b和私钥a 。n和b是公开的,发送信息方用私钥n加密消息,接受方用公钥b能得到解密后的信息,从而确定发送信息方的身份,这就构成了签名机制。对方用公钥将要发送的信息加密,只有拥有私钥的一方才能将信息解密。-RSA is the most important feature of dual-key, they have a special mathematical form. RSA keys of a
AES
- Rijndael加密算法是分组长度可变的分组密码。分组长度,密钥长度可以为128,192,256比特。 假设加密的中间结果为状态State。状态State可以用类似于元素为一字节的矩阵来表示,矩阵的行数为4,列数为Nb,Nb等于分组长度除以32。 -Rijndael encryption algorithm is the grouping variable length block cipher. Packet length, key length for the bit 128,192
CryptanalysisofHwang-ChangsaTime-StampProtocolforD
- Cryptanalysis of Hwang-Changs a Time-Stamp Protocol for Digital Watermarking-In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit watermarking. They claimed that their scheme is secure against attacks. However, in this article,
RSADES
- 使用RSA和DES两种算法为基础,设计实现了一个简单的网络传输模型。模型里有两个类,Server和Client,Server端要将自己的公钥发给Client,然后Client将自己的DES密钥通过RSA加密发给Server 端。之后双方可以通过DES对称加密进行通信。-Two algorithms using the RSA and the DES, based on designs and implements a simple model of network transmission. M
script
- 得用加密锁对相应的网页进行加密处理!加密锁可选用域天加密锁,简单实用!-Starting a lock on the corresponding web page encrypt encrypted! Encryption can choose the domain-day lock encryption locks, simple and practical!
7323_ETC_OV7620_datasheet
- OV7620的DATASHEET 数据手册,不过被加密了,可以看,不能复制打印-The DATASHEET of OV7620 , but is encrypted, and can be seen, can not copy or print
OpenLicense_0.95_src
- The Open License is to develop a complete .NET License Manager. The purpose is to extend the built in License Manager framework in .NET. Feature A GUI to build the license Support Product Licensing 512 bit encrypted license file License
WithIPtelephonesysteminterface
- 通讯接口规范,包括长连接,报文、报体、加密说明-Communication Interface Specification, including the long connection, message, reported that body, encrypted instructions, etc.
ET199
- ET199 超级多功能锁用户手册加密锁篇V1.0 -ET199 Super Lock function locks the user manual chapter encrypted version of version V1.0
SMC1290
- SMC1290A台产可读可写加密信息钮扣资料和编程应用资料-SMC1290A table read and write encrypted information production data and program application information button
wdglxt
- 在考试完成后,通过影像方式记录试卷的基本信息信息、学生身份信息,并在自动加密后生成相应的电子化试卷档案存档。用于老师网上改卷,查阅,统计等。-After the examination, by way of recording the image information on paper the basic information, student identification information and automatically generates the appropriate enc
module_07_8_EncryptedCache
- ios encrypted cache implementation
MSPFET
- MSP430下载器,对于没加密的MSP430可读出和下载.bin .txt -The MSP430 download, read out for the MSP430 not encrypted and downloads. The bin. Txt
JAK
- In this paper, a security model is proposed which imposes the concept of secrecy over privacy for text messages. In the recent years, we have plenty of security tools which are developed to protect the transmission of multimedia objects. But appr
md5-encrypted--users-password
- 一些网站往往将用户的账号、密码等信息使用非加密的方式保存到数据库,比如账号使用类型为VarChar的UserCount字段,同样,密码也是采用类型为VarChar的Password字段。但是,如果我们打算采用MD5加密方式存储密码信息,就必须改变密码字段PassWord的类型为16为二进制方式,这个其实我们也不难理解,因为在前面的介绍中,我们知道加密以后的输出,是使用二进制数组的,所以,这里必须做相应的改变。 当用户注册成功,正式建立一个账号的时候,数据库中就必须为这个用户增加一条记录。
Reversible-Data-Hiding-in-Encrypted-Images-by-Res
- ecently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the
