搜索资源列表
Secure Web Forms with Client-Side Signatures
- The World Wide Web is evolving from a platform for infor- mation access into a platform for interactive services. The interaction of the services is provided by forms. Some of these services, such as bank- ing and e-commerce, require secure, non-repu
MAC_ANSI_X9_19
- describes MAC ANSI X9.19 algorith which used in secure messaging
USBMassStorageDeviceUsingPICMCU
- This application note describes the design and implementation of a usb mass storage devic using a secure digital card,which should prove useful to developers of usb mass storage solution.This application may be used as a stand-alone MSD or as a S
PKITS.pdf
- A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on
SECURE_LEACH_ROUTING_PROTOCOL_BASED_ON_LOW-POWER_
- ABSTRACT In this paper we put forward a kind of secure LEACH routing protocol (SC-LEACH) based on low-power clusterhead selection algorithm. This protocol gets the total number of all nodes by their collaboration in selecting, to precisely calculat
DEPENDABLE-AND-SECURE-COMPUTING
- this files are ieee updated doc
science4
- The current European Union (EU) energy policy seeks to reach a balance between sustainable development, competitiveness and secure supply. In this sense, the EU energy policy sets the target of a 13 share of renewable energy sources (RESs) for B
ajp-jp3v7p2433
- The current European Union (EU) energy policy seeks to reach a balance between sustainable development, competitiveness and secure supply. In this sense, the EU energy policy sets the target of a 13 share of renewable energy sources (RESs) for B
01668285_power-system
- Electrical power systems are one of the most complex large scale systems. Over the past decades, with deregulation and increasing demand in many countries, power systems have been operated in a stressed condition and subject to higher risks of
Java-Project-on-SECURE-INTERCONNECTION-OF-LDAP-AN
- project report on Java-Project-on-SECURE-INTERCONNECTION-OF-LDAP-AND-DNSSEC-PKI-WITHIN-INTERNET
mpc-book
- 《Secure Multiparty Computation》是密码学研究的核心领域,希望对研究多方安全计算的密码学者有所帮助。-In a modern information-driven society, the everyday life of individuals and companies is full of cases where various kinds of private information is an important resource. While a cr
SAODV
- Secure Adhoc On Demand Distance Vector Routing
Secure-Skin-Tone-based-Steganography-Using1
- A Secure Skin Tone based Steganography Using Wavelet Transform
rsa
- Cryptographic Algorithms for Secure Data Communication
distribution-guidelines
- 为把中国南方网公司建设成为营型、服务型、一体化、现代化、国内领先、国际著名的企业,实现南方电网统一开放、结构合理、技术先进、安全可靠的发展目标,规范南方电网城市配电网的规划、设计、建设及改造工作,提高与电网设备装备水平,保证配电网安全、稳定、可靠、经济运行,满足南方五省(区)城市用电需要,特制定本导则。-WASHINGTON China to build the company into the camp, service-oriented, integrated, modernized, le
WCS-ispacs-2012-CR-v2
- This paper presents a two-factor authentication with key agreement scheme for web-based collaborative systems. The proposed mechanism integrates URI fragment identifier with secure email token and identity-based remote mutual authentication schem
Cloudauth-RACS-CR
- A private cloud provides organizations a secure environment to run business process. It provides a flexible way to extend the working environment. While user mobility has become an important feature for many systems, technologies that provide users
Chaotic-Secure-Communication
- 混沌保密通信系统的研究,阐述了混沌保密通信系统的发展-Research chaotic secure communication systems, describes the development of chaotic secure communication system
2.-High-Capacity-Secure-Image-Steganography-Based
- High Capacity Secure Image Steganography Based on
4.-HIGH--CAPACITY-AND-SECURE-DIGITAL-STEGANOGRAPH
- HIGH CAPACITY AND SECURE DIGITAL STEGANOGRAPHY TO-HIGH CAPACITY AND SECURE DIGITAL STEGANOGRAPHY TO
