Welcome![Sign In][Sign Up]
Location:
Search - CONFIDENTIAL

Search list

[SCM5385126

Description: 这份资料价值极高,主要是关于DP/PA耦合器的一种新的开发方法,对于软件编程、单片机及总线知识要求很高,不管怎样这样的资料网上极少,是从IEEE辛苦找到的。-The foreign DP/PA coupler is realized by SIM1+ MCU chip,with a large number of procedures and codes completed by the software, which is very complicated, and technology is confidential. The paper puts forward a design method that we use the smart agreement chip SPC3 and SPC4 as the core to realize the function of the coupler, and use AT89S52 single-chip to control them. These chips are integrated of DP/PA agreement ,so it is easier to achieve. And according to this design, we build the hardware, and complete the connection of DP and PA slave respectively in the laboratory. In addition through programming in Keil compiler environment, we accomplish the initialization of SPC3 and SPC4, interrupt handling, as well as DP/PA slave communication test. The experiment shows that the program achieves a satisfactory effect and we try to isolate transmission signal and 3.3V/5V power supply. KEYWORDS: DP
Platform: | Size: 277504 | Author: lixiaoxin | Hits:

[Crack HackAES

Description: AES加密是一个高效快捷用于军事加密等级的类模块,可以在任何工程中使用。AES(128位字区大小,使用128、192或者256位密钥长度)是用在美国政府进行保护机密(使用192或者256位密钥)和绝密文件的算法。不同于其他区段加密算法,AES是在VB中是最有效率的,因为加密一个区段能被使用唯一的CopyMemory,异或操作和一些位掩码。这个类模块可以支持所有的密钥和字区大小。并且难能可贵的是支持中英文混合加密。-AES encryption is a fast and efficient level of class for military encryption module can be used in any project. AES (128-bit words zone size, use 256-bit key length, or 128,192) is confidential to protect the U.S. government (using 192 or 256-bit keys), and top secret documents algorithms. Unlike other sections encryption algorithm, AES is in the VB is the most efficient, because the encryption of a section can be used only CopyMemory, XOR and some bit mask. This class module can support all of the key and the word zone size. And the valuable support of mixed encryption.
Platform: | Size: 30720 | Author: dick | Hits:

[Other080868B

Description: 可信计算技术在防钓鱼攻击中的应用 徐 锐,王震宇,康新振 (解放军信息工程大学信息工程学院,郑州 450002) 摘 要:钓鱼攻击手段的多样性及其攻击后果的严重性给用户身份信息等私密数据的管理带来巨大威胁。该文分析了当今主要几类钓鱼攻击的手段,剖析其攻击原理,并在分析比较现有的几种密钥保护机制的特点的基础上,将可信计算技术与安全套接字相结合,提出一种抵御钓鱼攻击的方法。根据钓鱼攻击的特点,进行了安全性能分析,表明其能有效抵御钓鱼攻击。 关键词:可信计算;钓鱼攻击;证书;密钥-Application of Trusted Computing Technology in Anti-fishing XU Rui,WANG Zhen-yu, KANG Xin-zhen (Institute of Information Engineering, PLA Information Engineering University, Zhengzhou 450002) 【Abstract】The diversity and severity of fishing attacks bring great threats to confidential data management such as identity management. Thispaper proposes a method which combines trusted computing technology and SSL(Secure Socket Layer) to prevent fishing attacks based oncomparing current mechanisms for preventing fishing after introducing some main kinds of current fishing attacks and analyzing the rationale of it.The security analysis shows that the proposed method can prevent current main kinds of fishing attacks effectively. 【Key words】trusted computing fishing attack certificate key
Platform: | Size: 76800 | Author: 林珺 | Hits:

[Oracledsi401_support_skill

Description: Oracle公司的机密文档(01),给内部工程师培训用的-Oracle Corporation s confidential documents (01), to use for internal engineer s training
Platform: | Size: 408576 | Author: 柳孟成 | Hits:

[Oracledsi401-d12853

Description: Oracle 公司的机密文档(02),给内部工程师培训用的-Oracle Corporation s confidential documents(02),to use for internal engineer s training
Platform: | Size: 691200 | Author: 柳孟成 | Hits:

[Oracledsi401e-d

Description: Oracle 公司的机密文档(03),给内部工程师培训用的-Oracle Corporation s confidential documents(03),to use for internal engineer s training
Platform: | Size: 435200 | Author: 柳孟成 | Hits:

[Oracledsi402-d12860

Description: Oracle 公司的机密文档(04),给内部工程师培训用的-Oracle Corporation s confidential documents(04),to use for internal engineer s training
Platform: | Size: 552960 | Author: 柳孟成 | Hits:

[Oracledsi402e-d12865

Description: Oracle 公司的机密文档(05),给内部工程师培训用的-Oracle Corporation s confidential documents(05),to use for internal engineer s training
Platform: | Size: 879616 | Author: 柳孟成 | Hits:

[Oracledsi403e-d12866

Description: Oracle 公司的机密文档(06),给内部工程师培训用的-Oracle Corporation s confidential documents(06),to use for internal engineer s training
Platform: | Size: 683008 | Author: 柳孟成 | Hits:

[Oracledsi404_query_optimizer

Description: Oracle 公司的机密文档(07),给内部工程师培训用的-Oracle Corporation s confidential documents(07),to use for internal engineer s training
Platform: | Size: 1127424 | Author: 柳孟成 | Hits:

[Oracledsi405

Description: Oracle 公司的机密文档(08),给内部工程师培训用的-Oracle Corporation s confidential documents(08),to use for internal engineer s training
Platform: | Size: 830464 | Author: 柳孟成 | Hits:

[Oracledsi408

Description: Oracle 公司的机密文档(09),给内部工程师培训用的-Oracle Corporation s confidential documents(09),to use for internal engineer s training
Platform: | Size: 971776 | Author: 柳孟成 | Hits:

[matlabCell_search

Description: 具有动态链接库的小区搜索程序。这个程序的dll文件属于平台机密啊。-Dynamic link library cell search procedure. Dll file of this program is platform confidential ah.
Platform: | Size: 28672 | Author: zhangyaodong | Hits:

[matlabCELL-SEARCH-ETU300

Description: 小区搜索的ETU-300的信道分析,有机密的动态链接库函数。-The ETU-300 cell search channel analysis, a dynamic link library functions confidential.
Platform: | Size: 30720 | Author: zhangyaodong | Hits:

[Crack HackDESTool

Description: 基于DES算法的机密工具,能够对任意文件进行加密。-DES algorithm based on a confidential tool that can encrypt any file.
Platform: | Size: 5132288 | Author: tan | Hits:

[Crack Hack3

Description: java实现的rsa加密机密文档,可自定义参数,希望对大家有帮助-java implementation of rsa encryption of confidential documents, can be customized parameters, we want to help
Platform: | Size: 874496 | Author: 王新 | Hits:

[WEB Codejiamiyujiemi

Description: 加密与解密文件,可以帮助用户进行文件的保密-Encryption and decryption of files that can help users confidential documents
Platform: | Size: 1024 | Author: luyanling | Hits:

[Crack HackDES

Description: 对称算法又称为传统密码算法。对称算法的对称性体现在加密密钥能够从解密密钥推算出来, 反之亦然。在大多数对称算法中, 加解密的密钥是相同的。可见, 对称密钥算法的加解密密钥都是保密的。对称密钥算法又分为两种分组密码和流密码。分组密码将明文分割为若干个定长的数据块称为一个分组, 每次对一个分组进行处理流密码又称序列密码, 依次对输人每个元素进行处理。DES算法是一种最通用的对称密钥算法, 属于分组密码算法。-Symmetric algorithm, also known as the traditional cryptographic algorithms. Reflected in the symmetry of symmetric algorithm encryption key can decrypt the keys derived from, and vice versa. In most symmetric algorithms, encryption and decryption key are the same. Visible, symmetric key encryption algorithm key are confidential. Symmetric key algorithm is divided into two block ciphers and stream ciphers. Cipher the plaintext is divided into a number of fixed-length blocks of data called a packet, each packet processing on a stream cipher, also known as cipher, each element in turn for processing the input. DES algorithm is a symmetric key algorithm is the most common, is block cipher.
Platform: | Size: 86016 | Author: 王风 | Hits:

[File OperateFileEncry

Description: 本程序通过加密文件夹的方法防治文件被打开,以保护用户的机密文件-This program through encryption method of prevention and cure folder file is open to protect the user s confidential documents
Platform: | Size: 14336 | Author: 李华 | Hits:

[ADO-ODBCVLDB07Secu

Description: 数据库外包 数据库外包 数据库外包 数据库外包-The networked and increasingly ubiquitous nature of today’s data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly relevant for outsourced data frameworks in which clients place data management with specialized service providers. Clients are reluctant to place sensitive data under the con- trol of a foreign party without assurances of confidential- ity. Additionally, once outsourced, privacy and data access correctness (data integrity and query completeness) become paramount. Today’s solutions are fundamentally insecure and vulnerable to illicit behavior, because they do not han- dle these dimensions.
Platform: | Size: 114688 | Author: wang | Hits:
« 1 2 ... 4 5 6 7 8 910 11 12 13 14 15 16 »

CodeBus www.codebus.net