Welcome![Sign In][Sign Up]
Location:
Search - authentication

Search list

[AI-NN-PR112611712642

Description: 特别是在题库管理模块中对自动组卷功能常用的算法(包括随机选取法、回溯试探法和遗传算法)进行了比较。对于较流行的验证码技术也给出了具体实现。-particularly in the examination management module to automatically making up the algorithm commonly used functions (including random selection method, Retrospective testing and genetic algorithm) were compared. For more popular authentication code technology has provided a concrete realization.
Platform: | Size: 721920 | Author: 形锦纶 | Hits:

[VC/MFCSecure_Programming_Cookbook_for_C_and_C++

Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: | Size: 1405952 | Author: 周爽 | Hits:

[Special Effectsfinger_all_System_pcode

Description: 一种基于纹理分类的数字指纹授权认证系统,matlab实现,在傅立叶域中嵌入数字指纹-texture classification based on the number of authorized fingerprint authentication system, the realization of Matlab, Fourier domain embedded in digital fingerprints
Platform: | Size: 461824 | Author: 刘波 | Hits:

[Special Effectsharisuciciwatermark

Description: 于内容的图像认证技术是一种新颖的图像信息安全技术,用来验证数字图像内容的完整性与真实 性。本文介绍了基于内容的图像认证技术的分类、发展历史和研究现状,并针对其现有算法的缺陷,对未来的发 展趋势和应用进行了展望。 -content in the image authentication technology is a novel image information security technology, used to verify digital image content authenticity and integrity. This paper introduces the content-based image authentication techniques classification, history and current status of research and against its existing algorithm, the future trends and applications of Outlook.
Platform: | Size: 758784 | Author: cici | Hits:

[Software EngineeringRFC1994_PPP

Description: PPP挑战握手认证协议(CHAP),PPP【1】提供了点到点链路传输多协议数据报的标准方法。 在PPP中也定义了一种可扩展的LCP,允许协商认证协议,从而可以在进行网络层 协议传输之前对对端进行认证。 本文定义了一种PPP认证方法,该方法利用随机“挑战”和依据“挑战”和密钥 计算出的加密哈希“应答”来完成认证。 -PPP Challenge Handshake Authentication Protocol (CHAP), PPP [1] provides a point-to-point link multi-protocol data transmission of standard methods. In PPP also defines a scalable LCP to allow consultations authentication protocol, thereby conducting transmission network layer protocol before the end-to-end authentication. This paper defines a PPP authentication methods, The method using random "challenge" and the basis for "challenge" and calculated key encryption Hash "responsive" to complete certification.
Platform: | Size: 15360 | Author: wangwen | Hits:

[OS programu1

Description: 基于U盘的身份认证-程序 随着科技的发展,IT技术的投飞猛进发展。优盘走进了普通计算机用户的手中,逐渐了取代了计算中的软驱的位置。现在的优盘生产厂家较多、价格比较低廉、稳定性较高、容量较大、功能也越来越多。使用计算机用户手中的优盘设备作为加密载体是最合适的选择。因为不需要任何软件商的投资,不用担心核心技术的控制。最为软件厂商的工作就是开发一套基于优盘的机密体系。-U disk-based authentication- procedures with the advance of technology, IT technology for the development of fly Mengjin. USB into the hands of ordinary computer users, has gradually replaced the calculation of the location of the floppy. USB now more manufacturers, the price relatively low, stable high, larger capacity, more and more features. The hands of computer users to use USB devices as encryption vector is the most suitable choice. Because software vendors do not require any investment, need not worry about the core technology. Most software vendors is to develop a confidential system based on USB.
Platform: | Size: 105472 | Author: caner199 | Hits:

[SCMSCI

Description: 飞思卡尔单片机MC9S08AW60 SCI串口部分操作源码。验证通过。-Freescale s single-chip serial MC9S08AW60 SCI source part of the operation. Authentication through.
Platform: | Size: 91136 | Author: 安科瑞 | Hits:

[OS programAuthentication

Description: SAMPSSP Some of the APIs used in this sample are not Win32 APIs. They are specific APIs for Security Providers.
Platform: | Size: 26624 | Author: xzhuwu | Hits:

[Graph Recognizezhiwenshibie

Description: 本文的研究目标是基于DSP技术与指纹相关的处理算法, 开发出一套基于DSP平台的指纹识别系统,实现安全、高效、方便的个人身份 鉴别。 -Research objectives of this article is based on DSP technology and fingerprint-related treatment algorithm, developed a DSP-based fingerprint identification system platform to achieve safe, efficient and convenient personal authentication.
Platform: | Size: 5505024 | Author: poon | Hits:

[Software Engineeringaa

Description: 基于指纹识别生物特征身份认证的信息加密系统-Based on the biometric fingerprint authentication information encryption system
Platform: | Size: 295936 | Author: 王旺 | Hits:

[Internet-NetworkRFC2617_HTTPAuthentication

Description: RFC2617_HTTP “HTTP/1.0”中包括基本访问鉴别方案(Basic Access Authentication scheme)本文档还提供了HTTP鉴别框架的规范,有关原始的基本鉴别方案和基于哈希加密的方案的内容-RFC2617_HTTP HTTP/1.0 includes basic access identification program (Basic Access Authentication scheme) in this document also provides the framework to identify the norms of HTTP, the basic identification of the original program and the program based on secret哈希加content
Platform: | Size: 261120 | Author: zhang | Hits:

[Software EngineeringSHA-based_session_authentication_technology

Description: SHA-based session authentication technology SHA-based session authentication technology
Platform: | Size: 178176 | Author: Ibarahimovic | Hits:

[Crack Hacksxjc

Description: 应用加密算法和认证技术 实验:Solovag-Strassen算法、Lehmann算法和Rabin-Miller算法的素性检测的原理与测试过程。-Application of encryption algorithms and authentication technology experiment: Solovag-Strassen algorithm, Lehmann algorithm and Rabin-Miller primality testing algorithm Principle and testing process.
Platform: | Size: 8192 | Author: 陈寅华 | Hits:

[Internet-Networkradius

Description: 一张关于radius认证的书籍。介绍很详细。我刚刚开始接触,不错-A radius authentication on the books. Very detailed introduction. I have just begun to contact, good
Platform: | Size: 65536 | Author: 水滴 | Hits:

[Graph Recognizezhiwenshibie

Description: 指纹识别技术是基于生物识别的认证技术,由于每个人的指纹具有唯一性, 终身不变,因此指纹识别是代替传统身份识别手段的最安全、最可靠、最方便的 方法之一。而指纹的预处理的好坏是指纹识别能否正确识别的关键。-Fingerprint recognition technology is based on biometric authentication technology, as each person
Platform: | Size: 2663424 | Author: 张杰 | Hits:

[Documentshash

Description: 这是一篇基于Hash函数敏感性的医学图像精确认证.本文提出了一种基于提升格式的整数小波变换和Hash函数敏感性相结合的易碎水印方法-This is a Hash Function Based on the sensitivity of the medical image accurate authentication. In this paper, a lifting scheme based on integer wavelet transform and Hash function that combines the sensitivity of fragile watermarking method
Platform: | Size: 616448 | Author: hj | Hits:

[Consolecprogram

Description: 包含大量C源代码均验证通过,相当经典且可移植性强-Contains a large amount of C source code for both the authentication is passed, a very strong classical and portability
Platform: | Size: 69632 | Author: chencangyi | Hits:

[File FormatWAPI

Description: WAPI是WLAN Authentication and Privacy Infrastructure的英文缩写。-WAPI is the WLAN Authentication and Privacy Infrastructure abbreviation.
Platform: | Size: 7168 | Author: fyc | Hits:

[Mathimatics-Numerical algorithms123

Description: vc++编写的图片验证系统 vc++编写的图片验证系统-vc++ prepared image authentication system vc++ prepared image authentication system
Platform: | Size: 51200 | Author: hutuchong | Hits:

[Special Effectslsydwt2

Description: 文本水印,基于小波的零水印,实现是文本文档的版权认证,鲁棒性好。-Text watermark, wavelet-based zero-watermark, the realization of a text document is copyright authentication, better robustness.
Platform: | Size: 1024 | Author: 廖家亮 | Hits:
« 1 23 4 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net