-
with BCB was a shell!
一个用BCB写的壳!-with BCB was a shell!
- 2023-04-12 01:50:03下载
- 积分:1
-
uthash 是一个C语言的哈希表,支持各种结构类型的存储、添加、删除,这些操作都在固定的时间完成,跟哈希表本身的大小无关。键也可以是任何类型的数据。...
uthash 是一个C语言的哈希表,支持各种结构类型的存储、添加、删除,这些操作都在固定的时间完成,跟哈希表本身的大小无关。键也可以是任何类型的数据。-is a C language uthash the hash table to support a variety of structural types of storage, add, delete, these operators are in a fixed time to complete, with the hash table size in itself has nothing to do. Keys can also be any type of data.
- 2022-07-09 02:00:59下载
- 积分:1
-
bb
说明: 基于AES和RSA加密算法的RFID安全机制
考虑到对国内应用最广泛的Mifarel系列标签的安全手t一级,
在建立以 MFRC500为读卡核心的RFID读卡系统的基础上,提出了一种基于非
对称加密与对称加密算法相结合的RFID安全机制。利用一1卜对称力11密算法对对称
加密算法的密钥的二次加密,做到只有特定的读写器才能拥有读写卡的权利。该
安全机制跳过RFID在开放环境中传输所面临的各种威胁,通过利少月安全性和稳
定性久经考验的公开安全加密算法对存入智能卡信息的重加密,解决了RFID所
面临的安全和隐私泄露问题
(Taking into account the most widely used domestic Mifarel series of labels t a safe hand,
In the establishment of MFRC500 as the reader, RFID reader system, the core was proposed based on a based on non-
Symmetric encryption and symmetric encryption algorithm is a combination of RFID security mechanism. The use of a one-Bu symmetry edge 11 close to the symmetric algorithm
The key encryption algorithm for re-keying, so that only certain card reader in order to have the right to read and write. The
Skip RFID security mechanisms to transfer in an open environment faced by a variety of threats, through the pros on the security and stability
Qualitative time-tested public security encryption algorithm into the smart card information, re-encryption, solved by RFID
Faced with the problem of security and privacy leaks)
- 2010-03-30 17:14:22下载
- 积分:1
-
BP算法的C++类,输入输出全部采用文件格式,不用在运行的时候一个一个输入拉...
BP算法的C++类,输入输出全部采用文件格式,不用在运行的时候一个一个输入拉-BP algorithm C++ Category, input and output file format used, do not have a running time of an input pull
- 2022-01-25 17:11:20下载
- 积分:1
-
AES complete source
AES算法完整源码-AES complete source
- 2022-09-20 15:30:04下载
- 积分:1
-
3des
3DES is a encryption algorithm ,this algorithm has run successfully.
- 2012-05-24 16:09:30下载
- 积分:1
-
RC6 encryption algorithm implementation
RC6 encryption algorithm implementation
- 2022-02-04 21:57:00下载
- 积分:1
-
RSA(NTL)
用VC6.0实现的,运用NTL大整数库实现RSA的加密和解密算法,具有较高的效率!(VC6.0 achieved by applying NTL large integer achieve RSA encryption and decryption algorithms, with high efficiency!)
- 2014-04-29 13:34:16下载
- 积分:1
-
沙
SHA-2 的代码实现-SHA-2 source implementation
- 2022-06-01 17:11:35下载
- 积分:1
-
1, the experimental requirements: high
1、 实验要求:用高级语言编写求自由距离的程序-1, the experimental requirements: high-level language used for the preparation of the procedures from the Freedom
- 2022-11-17 10:35:03下载
- 积分:1