CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.82
.83
.84
.85
.86
687
.88
.89
.90
.91
.92
...
1660
»
ECC
Downloaded:0
The full version of elliptic curve encryption algorithm, with C++ implementation, including key generation, encryption and decryption of files, can complete run ~
Date
: 2025-06-25
Size
: 1.33mb
User
:
lixiang
AES
Downloaded:0
The full version of AES encryption and decryption algorithm, switch the key 128,192,256. Smooth running, beautiful interface ~
Date
: 2025-06-25
Size
: 390kb
User
:
lixiang
Md5a_Tool
Downloaded:0
the md5 program used for check some file is same or not
Date
: 2025-06-25
Size
: 78kb
User
:
DES_code_c
Downloaded:0
In visual studio 2005 environment, the development of a DES encryption and decryption process, using the C language, can be completed. Txt file encryption and decryption operations, does not support the pdf and other fil
Date
: 2025-06-25
Size
: 250kb
User
:
lw
DES_reference_GUI
Downloaded:0
DES encryption and decryption procedures, user interface, including the development of the MFC under VC6 procedures.
Date
: 2025-06-25
Size
: 281kb
User
:
lw
RC4
Downloaded:0
RC4 algorithm。 designed with C。first it run at VC6.0 .nOW it can run at VS08
Date
: 2025-06-25
Size
: 1kb
User
:
Peng
mima
Downloaded:0
C#, graphical interface to the file encryption and decryption operations
Date
: 2025-06-25
Size
: 277kb
User
:
protocol_anomaly_detection
Downloaded:0
This white paper aims at briefly describing the technologies currently used in filter design in Network-based Intrusion Detection System (NIDS). We will consider the advantages and drawbacks of using signature filters ve
Date
: 2025-06-25
Size
: 17kb
User
:
sinsin
protocol-anomaly-detection-network-based-intrusio
Downloaded:0
A taxonomy was developed by Axelsson to define the space of intrusion detection technology and classify IDSs. The taxonomy categorizes IDSs by their detection principle and their operational aspects. The two main categor
Date
: 2025-06-25
Size
: 81kb
User
:
sinsin
kww
Downloaded:0
Chaotic system to achieve ultra video encryption method designed by discrete cosine transform
Date
: 2025-06-25
Size
: 561kb
User
:
王丽丽
rsaDes
Downloaded:0
c++ written in a data encryption program, which has Des and the RSA algorithm, useful reference for beginners
Date
: 2025-06-25
Size
: 133kb
User
:
德科夫
ntundoc
Downloaded:0
This software and/or documentation is provided as free and it' s freely avaiable and redisributable, in a entirety or in a parts as long as a Copyright and author' s name are included. You are hereby permited to us
Date
: 2025-06-25
Size
: 193kb
User
:
xblue
«
1
2
...
.82
.83
.84
.85
.86
687
.88
.89
.90
.91
.92
...
1660
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.