Welcome![Sign In][Sign Up]
Location:
Search - cryptographic security

Search list

[Other resourceWindowsVista

Description: 《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
Platform: | Size: 3192939 | Author: zhuymgis | Hits:

[WinSock-NDISMD5

Description: MD5 (Message-Digest algorithm 5) is a widely used, partially insecure[1] cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. An MD5 hash is typically expressed as a 32 digit hexadecimal number.
Platform: | Size: 35531 | Author: chu | Hits:

[OtherWindowsVista

Description: 《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
Platform: | Size: 3192832 | Author: | Hits:

[Internet-NetworkMD5

Description: MD5 (Message-Digest algorithm 5) is a widely used, partially insecure[1] cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. An MD5 hash is typically expressed as a 32 digit hexadecimal number.
Platform: | Size: 3929088 | Author: chu | Hits:

[Software EngineeringArithmetric

Description: 浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity ,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptography命名空间(简称SSC).举例说明了利用SSC提供的类编写信息安全程序的方法,其中包括对称加密、非对称加密和数字签名算法的编程.-On the VB.NET password algorithm and its application of information security Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity, introduced the latest Microsoft development tools, Visual Basic 2005 (referred to as VB.NET) with the cryptographic algorithm associated System.Security.Cryptography namespace (the SSC). For example illustrates the use of SSC-type provided by the preparation of information security procedures, including symmetric encryption, asymmetric encryption and digital signature algorithm programming.
Platform: | Size: 354304 | Author: 刘皓 | Hits:

[WEB CodeSimpleEncryption_src_net2

Description: Microsoft s .NET framework has robust support for encryption in the System.Security.Cryptography namespace. Everything you need to perform encryption is available in that class, but it s difficult to understand unless you have a firm grasp of cryptographic theory. Over the last four months, I ve struggled with the concepts and theory behind encrypting and decrypting data. I ve wrapped all my derived knowledge into a class I call Encryption. This class is heavily documented, string oriented, and most of all, simple! It s ideal for learning more about encryption.-Microsoft s. NET framework has robust support for encryption in the System.Security.Cryptography namespace. Everything you need to perform encryption is available in that class, but it s difficult to understand unless you have a firm grasp of cryptographic theory. Over the last four months, I ve struggled with the concepts and theory behind encrypting and decrypting data. I ve wrapped all my derived knowledge into a class I call Encryption. This class is heavily documented, string oriented, and most of all, simple! It s ideal for learning more about encryption.
Platform: | Size: 27648 | Author: matt | Hits:

[Crack HackAES

Description: AES加密算法分析及其安全性研究,对于使用AES密码算法来研究网络、流媒体安全的程序员有帮助-AES encryption algorithm analysis and security research, for the use of AES cryptographic algorithm to study the network, security, streaming media programmers help
Platform: | Size: 281600 | Author: xiaolin | Hits:

[DocumentsE-comcasestudy1

Description: this the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.-this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.
Platform: | Size: 480256 | Author: mana | Hits:

[Industry researchNIST_Recommendation_for_X509_PVMs.pdf

Description: A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust anchors, and establish security services based on certificates that may be validated using one of their trust anchors.
Platform: | Size: 81920 | Author: Jacky | Hits:

[Crack Hackfpga_security

Description: The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.
Platform: | Size: 148480 | Author: Hassan Abdelaziz | Hits:

[CA authopencsp

Description: 微软CSP实现源码。 CSP:密码服务提供者。 微软的CryptoAPI是PKI推荐使用的加密 API。其功能是为应用程序开发者提供在Win32环境下使用加密、验证等安全服务时的标准加密接口。CryptoAPI处于应用程序和CSP(cryptographic service provider)之间 。 -Microsoft CSP achieve source. CSP: Cryptographic Service Provider. Microsoft' s CryptoAPI is recommended the use of PKI encryption API. Its function is to provide application development environment in Win32 the use of encryption, authentication and other security services interface standard encryption. CryptoAPI in applications, and CSP (cryptographic service provider) between.
Platform: | Size: 541696 | Author: eboy | Hits:

[OtherAddison.Wesley.The.Craft.of.System.Security.Dec.20

Description: After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures--with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures- with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system' s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing-After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures- with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system' s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing
Platform: | Size: 5532672 | Author: chen | Hits:

[OS program3DES

Description: 数据加密算法---3DES的C实现,效率高,安全可靠,可移植性好,能满足一般的加密安全需求。---- 3DES data encryption algorithm in C to achieve high efficiency, safety and reliability, portability is good, can hardly meet the cryptographic security requirements.
Platform: | Size: 197632 | Author: jinmy | Hits:

[OS program132

Description: Reliable communication is mission critical to Emergency and Rescue operations. MANET technology allowing communication where fixed infrastructure is not available is very attractive for this setting. Emergency and Rescue operations may take place in both hostile as well as benign environment. The communication system must handle both situations. Security attacks can be launched towards any layer of the protocol stack. What is new with wireless ad hoc networks is the network layer routing information as a more probable target for security attacks. A reliable network service cannot be provided without embracing routing information security. The primary challenge is to decide which routing information can be trusted. The answer so far is cryptographically signed routing messages. The possession of cryptographic keys serves as proof of trustworthiness. A proper key management service is thus a critical factor for the success of wireless ad hoc networks.
Platform: | Size: 70656 | Author: Rishi | Hits:

[Windows CEUsingPublicKey

Description: Develop a communications security architecture incorporating cryptographic security mechanisms that efficiently support the provision of required integrity, authentication, and confidentiality security services within distributed networks of resource-limited sensors
Platform: | Size: 100352 | Author: islam | Hits:

[Delphi VCLOpenStrSecII-2.1.8.221

Description: StreamSec2.1工具是在Borland delphi开发环境下安全的加密收集相关组件和类。该产品包括模块化的SSL / TLS的,S / MIME和X.509的实现。- StreamSec Tools 2.1 is collection of cryptographic security related components, classes and routines for the Borland (R) Delphi (TM) development environment. The product includes modular clean room implementations of SSL/TLS, S/MIME and X.509.
Platform: | Size: 4258816 | Author: ccvcd | Hits:

[JSP/JavaBlindAuthentication

Description: Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns as shown by biometric cryptosystems. In this paper, we propose a provably secure and blind biometric authentication protocol, which addresses the concerns of user抯 privacy, template protection, and trust issues.
Platform: | Size: 1581056 | Author: prabhu | Hits:

[SCMAT90SC144144C

Description: Cryptographic Module Security Policy for jNet Citadel-OS on Atmel AT90SC144144CT
Platform: | Size: 418816 | Author: johnny | Hits:

[Crack HackCryptographic

Description: 里面包含DES,AES,RSA,DSA,ESS,SHA等的算法源码,对学习网络安全算法的人挺实用的。代码很齐全。-Containing DES, AES, RSA, DSA, ESS, SHA algorithms such as source code, to learn network security algorithms were very useful. Code is complete.
Platform: | Size: 559104 | Author: yushuyuan | Hits:

[Crack Hackcourse-87.fb2

Description: Cryptographic security framework
Platform: | Size: 685056 | Author: lifemanship | Hits:
« 12 3 4 5 »

CodeBus www.codebus.net