在cdma2000移动通信系统中使用A-Key实现空中接口部分无线接入的身份验证和加密密钥的产生。
上传时间: 2014-01-04
上传用户:cccole0605
Use the crypto module to encrypt sensitive data using a key you generated yourself... This is quite handy with INI files which you can use to get and set data for you applications. You can also check out some dates related to passwords and expiry dates. Send emails using Microsoft Email client. No need to cater for SMTP nor Exchange mail accounts. If you can send email with your outlook, you can send email with your application. Get some windows info with the sysinfoctrls member.
标签: generated sensitive yourself encrypt
上传时间: 2017-04-04
上传用户:yuanyuan123
EZW coding implementation. using wavelet transforms as a key tool. compression and decoding is done using EZW algorithm.
标签: implementation compression transforms decoding
上传时间: 2017-04-10
上传用户:顶得柱
EZW coding implementation. using wavelet transforms as a key tool. compression and decoding is done using modified EZW algorithm.
标签: implementation compression transforms decoding
上传时间: 2017-04-10
上传用户:wkchong
SPIHT coding implementation. using wavelet transforms as a key tool. compression and decoding is done using SPIHT algorithm.
标签: implementation compression transforms decoding
上传时间: 2014-11-26
上传用户:asdfasdfd
Learn how to leverage a key Java technology used to access relational data from Java programs, in an Oracle environment. Author Donald Bales begins by teaching you the mysteries of establishing database connections, and how to issue SQL queries and get results back. You ll move on to advanced topics such as streaming large objects, calling PL/procedures, and working with Oracle9i s object-oriented features, then finish with a look at transactions, concurrency management, and performance
标签: Java technology relational leverage
上传时间: 2017-08-02
上传用户:xz85592677
Driver Virtual keyboard. Allows you to create programs that need to send a key to bypass Win32. Suitable for games where prohibited send key.
标签: keyboard to programs Virtual
上传时间: 2017-08-04
上传用户:zhenyushaw
memcat - Copy the value of a key to standard output memflush - Flush the contents of your servers. memrm - Remove a key(s) from the server. memstat - Dump the stats of your servers to standard output memslap - Load generation utility (benchmark!)
标签: the contents memflush standard
上传时间: 2014-11-28
上传用户:zhuimenghuadie
The mature CMOS fabrication processes are available in many IC foundries. It is cost-effective to leverage the existing CMOS fabrication technologies to implement MEMS devices. On the other hand, the MEMS devices could also add values to the IC industry as the Moore’s law reaching its limit. The CMOS MEMS could play a key role to bridge the gap between the CMOS and MEMS technologies. The CMOS MEMS also offers the advantage of monolithic integration of ICs and micro mechanical components.
标签: TECHNOLOGY CMOS MEMS KEY
上传时间: 2020-06-06
上传用户:shancjb
The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Key Encapsulation Mechanism, and off-the-shelf ciphers and HMACs are used for the actual encryption. (See Lynn, "Authenticated Identity-Based Encryption", available on eprint.
标签: Boneh-Franklin implementation identity-based encryption
上传时间: 2013-12-20
上传用户:yan2267246