登录
首页 » PowerBuilder » tool

tool

于 2012-12-18 发布 文件大小:69KB
0 287
下载积分: 1 下载次数: 14

代码说明:

  pb程序设计常用的数字及字符加密与解密应用。(pb common programming digital character encryption and decryption.)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • with BCB was a shell!
    一个用BCB写的壳!-with BCB was a shell!
    2023-04-12 01:50:03下载
    积分:1
  • uthash 是一个C语言的哈希表,支持各种结构类型的存储、添、删除,这些操作都在固定的时间完成,跟哈希表本身的大小无关。键也可以是任何类型的数据。...
    uthash 是一个C语言的哈希表,支持各种结构类型的存储、添加、删除,这些操作都在固定的时间完成,跟哈希表本身的大小无关。键也可以是任何类型的数据。-is a C language uthash the hash table to support a variety of structural types of storage, add, delete, these operators are in a fixed time to complete, with the hash table size in itself has nothing to do. Keys can also be any type of data.
    2022-07-09 02:00:59下载
    积分:1
  • bb
    说明:  基于AES和RSA加密算法的RFID安全机制 考虑到对国内应用最广泛的Mifarel系列标签的安全手t一级, 在建立以 MFRC500为读卡核心的RFID读卡系统的基础上,提出了一种基于非 对称加密与对称加密算法相结合的RFID安全机制。利用一1卜对称力11密算法对对称 加密算法的密钥的二次加密,做到只有特定的读写器才能拥有读写卡的权利。该 安全机制跳过RFID在开放环境中传输所面临的各种威胁,通过利少月安全性和稳 定性久经考验的公开安全加密算法对存入智能卡信息的重加密,解决了RFID所 面临的安全和隐私泄露问题 (Taking into account the most widely used domestic Mifarel series of labels t a safe hand, In the establishment of MFRC500 as the reader, RFID reader system, the core was proposed based on a based on non- Symmetric encryption and symmetric encryption algorithm is a combination of RFID security mechanism. The use of a one-Bu symmetry edge 11 close to the symmetric algorithm The key encryption algorithm for re-keying, so that only certain card reader in order to have the right to read and write. The Skip RFID security mechanisms to transfer in an open environment faced by a variety of threats, through the pros on the security and stability Qualitative time-tested public security encryption algorithm into the smart card information, re-encryption, solved by RFID Faced with the problem of security and privacy leaks)
    2010-03-30 17:14:22下载
    积分:1
  • BP算法的C++类,输入输出全部采用文件格式,不用在运行的时候一个一个输入拉...
    BP算法的C++类,输入输出全部采用文件格式,不用在运行的时候一个一个输入拉-BP algorithm C++ Category, input and output file format used, do not have a running time of an input pull
    2022-01-25 17:11:20下载
    积分:1
  • AES complete source
    AES算法完整源码-AES complete source
    2022-09-20 15:30:04下载
    积分:1
  • 3des
    3DES is a encryption algorithm ,this algorithm has run successfully.
    2012-05-24 16:09:30下载
    积分:1
  • RC6 encryption algorithm implementation
    RC6 encryption algorithm implementation
    2022-02-04 21:57:00下载
    积分:1
  • RSA(NTL)
    用VC6.0实现的,运用NTL大整数库实现RSA的加密和解密算法,具有较高的效率!(VC6.0 achieved by applying NTL large integer achieve RSA encryption and decryption algorithms, with high efficiency!)
    2014-04-29 13:34:16下载
    积分:1
  • SHA-2 的代码实现-SHA-2 source implementation
    2022-06-01 17:11:35下载
    积分:1
  • 1, the experimental requirements: high
    1、 实验要求:用高级语言编写求自由距离的程序-1, the experimental requirements: high-level language used for the preparation of the procedures from the Freedom
    2022-11-17 10:35:03下载
    积分:1
  • 696516资源总数
  • 106442会员总数
  • 11今日下载