虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

ENCryption

加密,是以某种特殊的算法改变原有的信息数据,使得未授权的用户即使获得了已加密的信息,但因不知解密的方法,仍然无法了解信息的内容。在航空学中,指利用航空摄影像片上已知的少数控制点,通过对像片测量和计算的方法在像对或整条航摄带上增加控制点的作业。
  • ava加密扩展即Java Cryptography Extension

    ava加密扩展即Java Cryptography Extension,简称JCE。它是Sun的加密服务软件,包含了加密和密匙生成功能。JCE是JCA(Java Cryptography Architecture)的一种扩展。 JCE没有规定具体的加密算法,但提供了一个框架,加密算法的具体实现可以作为服务提供者加入。除了JCE框架之外,JCE软件包还包含了SunJCE服务提供者,其中包括许多有用的加密算法,比如DES(Data ENCryption Standard)和Blowfish。 为简单计,在本文中我们将用DES算法加密和解密字节码。下面是用JCE加密和解密数据必须遵循的基本步骤: 步骤1:生成一个安全密匙。在加密或解密任何数据之前需要有一个密匙。密匙是随同被加密的应用一起发布的一小段数据,Listing 3显示了如何生成一个密匙。 【Listing 3:生成一个密匙】

    标签: Cryptography Extension Java ava

    上传时间: 2015-03-26

    上传用户:nanxia

  • FlexCompress is a high-speed compression library developed to provide archive functionality for your

    FlexCompress is a high-speed compression library developed to provide archive functionality for your applications. This solution provides flexible compression and strong ENCryption algorithms that allows you to integrate archiving or backup features into your programs in a fast and easy way.

    标签: functionality FlexCompress compression high-speed

    上传时间: 2015-04-04

    上传用户:s363994250

  • 这是一篇有关混沌在视频中加密的文章

    这是一篇有关混沌在视频中加密的文章,题目为:A fast video ENCryption scheme based-on chaos。不过看看懂还是要花一些时间的,不过我可以和大家交流。还有这是英文作写。

    标签: 混沌 加密 视频

    上传时间: 2015-04-09

    上传用户:zhaiyanzhong

  • Base64 demonstrates how easy it is to decipher plaintext usernames and passwords. Never login to a

    Base64 demonstrates how easy it is to decipher plaintext usernames and passwords. Never login to a public network resource unless some type of ENCryption is being used, secure socket layer is one example. Most FTP sites also use plaintext passwords.

    标签: demonstrates plaintext passwords usernames

    上传时间: 2013-12-04

    上传用户:aeiouetla

  • rsa加密算法的vc实现

    rsa加密算法的vc实现,可以实现1024位的加密-the source code of rsa algorithm in vc,which can do 1024bits ENCryption.

    标签: rsa 加密算法

    上传时间: 2014-08-24

    上传用户:虫虫虫虫虫虫

  • PeerSec Networks MatrixSSL?is an embedded SSL implementation designed for small footprint applicatio

    PeerSec Networks MatrixSSL?is an embedded SSL implementation designed for small footprint applications and devices. PeerSec Networks offers a fully supported, commercial version as well as an open source version that is available for download. PeerSec MatrixSSL allows secure management of remote devices. Several secure embedded Web servers also use MatrixSSL for their ENCryption layer.

    标签: implementation applicatio MatrixSSL footprint

    上传时间: 2014-01-18

    上传用户:561596

  • Make and answer phone calls Detect tone and pulse digit from the phone line Capture Caller ID

    Make and answer phone calls Detect tone and pulse digit from the phone line Capture Caller ID Support blind transfer, single-step transfer/conference, consultation transfer/conference, hold, unhold. Control of the local phone handset, microphone and speaker of the modem Send and receive faxes Play and record on the phone line or sound card Play music in background mode Silence detection VU Meter Wave sound editor that allows your end-users to edit their own sound files. Voice recognition and voice synthesis. Full control over the serial port device ZModem file transfer utility File compression and ENCryption utility

    标签: phone and Capture Detect

    上传时间: 2013-11-30

    上传用户:水中浮云

  • What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the poss

    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple ENCryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now ENCryption is over)

    标签: Sometimes the contents desire

    上传时间: 2013-12-25

    上传用户:playboys0

  • The Microsoft® Cryptographic Application Programming Interface (CryptoAPI) provides services that

    The Microsoft® Cryptographic Application Programming Interface (CryptoAPI) provides services that enable application developers to add authentication, encoding, and ENCryption to their Microsoft Win32® -based applications. Application developers can use the functions in the CryptoAPI without knowing anything about the underlying implementation, in much the same way as they can use a graphics library without knowing anything about the particular graphics hardware configuration.

    标签: Cryptographic Application Programming Microsoft

    上传时间: 2013-12-27

    上传用户:pinksun9

  • This library allows creating, modifying and extracting zip archives in the compatible way with PKZIP

    This library allows creating, modifying and extracting zip archives in the compatible way with PKZIP (2.5 and higher) and WinZip. Supported are all possible operations on the zip archive: creating, extracting, adding, deleting files from the archive, modifications of the existing archive. There is also the support for creating and extracting multiple disk archives (on non-removable devices as well) and for password ENCryption and decryption. This module uses compression and decompression functions from zlib library by Jean-loup Gailly and Mark Adler.

    标签: compatible extracting modifying creating

    上传时间: 2014-12-22

    上传用户:chfanjiang