搜索资源列表
NIST_Recommendation_for_X509_PVMs.pdf
- A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or
darkfire
- I m releasing my private ring3 rootkit "DarkFire" now. It s written in C#, source is included. Also there are the 4 examples, but you may also execute the source from VS if you don t trust exes... Features: * Hide Processes * Hide Regis
SECURE_LEACH_ROUTING_PROTOCOL_BASED_ON_LOW-POWER_
- ABSTRACT In this paper we put forward a kind of secure LEACH routing protocol (SC-LEACH) based on low-power clusterhead selection algorithm. This protocol gets the total number of all nodes by their collaboration in selecting, to precisely calculat
Programming-and-Customizing-the-PIC-Microcontroll
- In the introduction to the first edition of this book, I explained my fascination with the Intel 8048 microcontroller. I first discovered this device when I was looking at the first IBM Personal Computer’s schematics. While the PC’s schematic its
mpc-book
- 《Secure Multiparty Computation》是密码学研究的核心领域,希望对研究多方安全计算的密码学者有所帮助。-In a modern information-driven society, the everyday life of individuals and companies is full of cases where various kinds of private information is an important resource. While a cr
eclipse
- eclipse快捷键使用方式,非常齐全,绝对的值-eclipse shortcut keys used, very well equipped, the absolute value of the
WD18-64bit
- Emulation keys registry WinDev 18
Modifying_Memory_Security_Keys_TMS470
- This document shows how to reprogram the Memory Security Module (MSM) keys on the TMS470 evices. These examples are intended as a reference to enable the user to modify the MSM keys and unlock the part using the IAR tools. The reference design inc
