Welcome![Sign In][Sign Up]
Location:
Search - authentication

Search list

[Crack Hacks+key

Description: 一次性口令认证系统SKEY的实现,采用MD5算法对口令进行加密,传递校验码-One-Time Password Authentication System sKey realization, using MD5 algorithm to encrypt passwords, transmission Check Code
Platform: | Size: 497664 | Author: 赵斌 | Hits:

[AI-NN-PRrennianshibie

Description: 人脸识别因其在安全验证系统、信用卡验证、医学、档案管理、视频会 议、人机交互、系统公安(罪犯识别等)等方面的巨大应用前景而越来越成为 当前模式识别和人工智能领域的一个研究热点。 -Face Recognition in the security of their authentication systems, credit card verification, medical, file management, video conferencing, human-computer interaction, the system of public security (criminal identification, etc.), such as the huge application prospects and has increasingly become the current field of pattern recognition and artificial intelligence a research hotspot.
Platform: | Size: 2282496 | Author: 唐勇 | Hits:

[OS programginafull3

Description: GINA:A Graphical Identification and Authentication dynamic-link library (DLL). The GINA is a replaceable DLL component that is loaded by the Winlogon executable. -GINA: A Graphical Identification and Authentication dynamic-link library (DLL). The GINA is a replaceable DLL component that is loaded by the Winlogon executable.
Platform: | Size: 124928 | Author: hugh herr | Hits:

[Special EffectsAudioWatermarkingforContentAuthentication

Description: 该水印算法具有以下特点:1)结合音频自身的特性,不仅能够自适应划分音频数据段,而且能够智能调节水印嵌入强度,增强了数字音频水印的鲁棒性;2)能够同时进行数字音频的版权保护与内容认证,并可大致确定篡改发生区域,仿真实验表明,文中算法不仅具有较好的不可感知性,而且对常规处理具有较好的鲁棒性,同时能够对替换等而已篡改做出报警并确定被篡改位置。-The watermarking algorithm has the following characteristics: 1) combined with the audio of its own characteristics, not only adaptive division of the audio data segment, but also can adjust watermark embedding intelligent strength, enhanced digital audio watermark robustness 2) can at the same time digital audio copyright protection and content authentication, and can generally determine the tampering occurred in the region, simulation experiments show that the algorithm not only has better not be perceived, but also on conventional treatment has good robustness, at the same time be able to tamper with it to make replacement alarm and to determine the location has been tampered with.
Platform: | Size: 2048 | Author: byleimin | Hits:

[Internet-Networkw3c-libwww-5.4.0

Description: www工具包. 这是W3C官方支持的www支撑库. 其中提供通用目的的客户端的WebAPI: complete HTTP/1.1 (with caching, pipelining, PUT, POST, Digest Authentication, deflate, etc), MySQL logging, FTP, HTML/4, XML (expat), RDF (SiRPAC), WebDAV, and much more-Libwww is a highly modular, general-purpose client side Web API written in C for Unix and Windows (Win32). It s well suited for both small and large applications, like browser/editors, robots, batch tools, etc. Pluggable modules provided with libwww include complete HTTP/1.1 (with caching, pipelining, PUT, POST, Digest Authentication, deflate, etc), MySQL logging, FTP, HTML/4, XML (expat), RDF (SiRPAC), WebDAV, and much more. The purpose of libwww is to serve as a testbed for protocol experiments.
Platform: | Size: 1688576 | Author: Banlyst Yeh | Hits:

[JSPjava

Description: 本书以大量精简的实例介绍了Java安全性编程方面的概念和技术,全书共计9章。 经过精心设计,每个小节的实例着重说明一个问题,又相互贯穿和联系。涉及Java加密和解密,反编译和反反编译,对类、成员变量、方法的攻击和保护,消息摘要,消息验证码,数字签名,口令保护,数字证书和证书链的生成、签发、检验和维护,SSL和HTTPS客户及服务器程序、基于代码位置和签发者的授权,签名Java Applet,基于身份的验证和授权(JAAS)等。 全书的实例极为精简,只保留了能够说明问题的代码,而又可真正运行,便于Java入门者轻松掌握安全性方面繁杂的概念。适合于适合于初步了解Java语法的学习者,也适合于安全技术的入门及高校Java教学参考。 -This book introducte the Java security programming concepts and techniques by a large number of examples ,book total of 9 chapters. Carefully designed, each section highlights examples of a problem, and contact each other throughout. Involving Java encryption and decryption, decompile and compile counter of class, member variables, methods of attack and protection, message digest, message authentication codes, digital signatures, password protection, digital certificate and certificate chain generation, issuance, inspection and maintenance, SSL and HTTPS clients and server program, based on code location and issuer of the authorized signature Java Applet, identity-based authentication and authorization (JAAS) and so on. Examples of the book is extremely streamlined, leaving only the problem that can code and who can really run, easy to Java beginners to easily grasp complex security concepts.
Platform: | Size: 2375680 | Author: wang chao | Hits:

[Crack HackIS_Project1

Description: 这是一个文本加密、解密系统,提供了对称加密和非对称加密两种模式。此外,还实现了数字签名及其验证功能。-This is a text encryption, decryption system provides symmetric encryption and asymmetric encryption mode. In addition, implementation of digital signature and the authentication function.
Platform: | Size: 1289216 | Author: 孙一鸣 | Hits:

[Industry researchRecognition.of.human.Iris.Patterns

Description: This a thesis paper on iris recognition. it will be very helpful in guyz who are doin projects on biometric authentication- This is a thesis paper on iris recognition. it will be very helpful in guyz who are doin projects on biometric authentication
Platform: | Size: 1758208 | Author: Shaheer | Hits:

[JSP/Javaatmnew

Description: 基于Java技术,只实现了ATM机的取款过程 在这个程序中,用到以下JAVA类库:      dataAccess(数据操作)类:包含用于数据库的相关操作   atmScreen(ATM屏幕)类:主要创建各操作窗体和相应按钮事件   Account(用户帐户)类:包含用户信息的验证、余额查询和扣钱等方法   readCard(读卡机)类:包含读取用户卡号和退卡(退出系统)   moneyMachine(取钱机)类:只用于打印清单   Atm(系统)类:系统主方法的开始,负责调用其他类-Based on Java technology, only the implementation process of ATM cash machine at this procedure, use the following JAVA class library: dataAccess (Data Manipulation) categories: database contains the relevant operation for atmScreen (ATM screen) categories: the main window to create the operation and the corresponding button Event Account (user account) categories: contains the user authentication information, such as balance inquiries and扣钱Ways readCard (card reader) categories: contains read the user card number and retirement card (System Exit) moneyMachine (money machine) categories: just for printing a list of Atm (System) categories: system, start the main method is responsible for other types of call
Platform: | Size: 73728 | Author: 任海涛 | Hits:

[matlabRotateImage

Description: 图像处理,图像的反转的matlab例程,验证可用,请多多指教-Image processing, image reversal of matlab routines, authentication is available, please advice
Platform: | Size: 3072 | Author: 陈阳 | Hits:

[Program docgsm_security

Description: GSM Security and the protocols involves in a mobile environment authentication proce-GSM Security and the protocols involves in a mobile environment authentication process
Platform: | Size: 118784 | Author: renuka | Hits:

[WEB Codeauthentication

Description: authentication example in php
Platform: | Size: 12288 | Author: joachim | Hits:

[JSP/Javajs表单验证控制代码大全

Description: 是javascript 的表单验证控制代码的很好手册-Forms Authentication is the javascript code of good manual control
Platform: | Size: 270336 | Author: 天风 | Hits:

[Delphi VCLDelphiLDAPAuthenticationComponent

Description: Delphi LDAP Authentication Component delphi ldap控件-Delphi LDAP Authentication Component delphi ldap control
Platform: | Size: 519168 | Author: 123456 | Hits:

[matlab2021101311382007915161310494649

Description: matlab处理指纹图像,由于指纹的唯一性、可靠性和稳定性,指纹已成为身份识别和鉴定的一个重 要标志,并被公认为“物证之首”。指纹识别作为一种生物识别技术,历来受到人们的广泛关注和重视,是未来个人身份认证的重要组成部分。-Fingerprint image processing matlab,Because the uniqueness of fingerprints, reliability and stability,fingerprint identification has become an important symbol of appraisal,and is recognized as the "first" material.The fingerprint identified as a kind of biometrics,has received extensive attention of,the individual identity authentication is the important component.Based on the MATLAB software applications for tools,for fingerprint image preprocessing and feature extraction technology research.Including pretreatment part involves by different methods of fingerprint image segmentation to extract valid area,with the improvement of OPTA thinning algorithm for thinning,
Platform: | Size: 427008 | Author: 赖晓燕 | Hits:

[Internet-NetworkCSmtp_v1_5

Description: VC++ smtp发送邮件源码,支持服务器验证的,找了很久,很多都是没有用户名密码验证,这个可以-VC++ smtp send mail source to support the authentication server to find for a long time, many of them are not user name password authentication, this can be
Platform: | Size: 21504 | Author: 土豆 | Hits:

[AI-NN-PRAuthenFAR_Test_NFL

Description: face authentication test
Platform: | Size: 3072 | Author: YN | Hits:

[Windows DevelopIrisRecognition

Description: 这个是虹膜识别系统,实现身份认证,在目前这还是一个十分先进的识别系统.-This is iris recognition system for authentication, in the present this is a very advanced identification system.
Platform: | Size: 405504 | Author: 向南 | Hits:

[Program doc802.1X.Port.based.Authentication-1420044648

Description: 802.1X Port Based Authentication manual
Platform: | Size: 2956288 | Author: insan | Hits:

[Windows Developbiometric

Description: This matlab code is for paper "Biometric Image Integrity Authentication Based on SVD and Fragile Watermarking"
Platform: | Size: 1024 | Author: Sathvika | Hits:
« 1 2 34 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net