this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.
标签: i.e. CRYPTOGRAPHY information the
上传时间: 2014-01-27
上传用户:ls530720646
This file becomes JSP that changes the password. It is operated on the Tomcat service.
标签: the password operated becomes
上传时间: 2013-12-10
上传用户:ryb
c51 primer - An Introduction To The Use Of The Keil C51 Compiler On The 8051 Family
标签: The Introduction Compiler Family
上传时间: 2013-12-19
上传用户:zhenyushaw
its a cool game that breaks the screen on the edges if you break ur screen fucking cool haha
上传时间: 2017-03-27
上传用户:litianchu
Runs a shell on the first unused tty。。。
上传时间: 2017-03-27
上传用户:yepeng139
OFDM based on the massive pilot channel estimation algorithm simulation, including the LS estimation algorithm Analysis of LSE
标签: estimation simulation algorithm including
上传时间: 2017-03-28
上传用户:wpwpwlxwlx
VMEbus slave architecture source code Can be implemented on the slave board of a chasis as slave controller
标签: slave architecture implemented VMEbus
上传时间: 2017-04-12
上传用户:远远ssad
Figure based on the CORDIC algorithm frequency method and its implementation in the FPGA
标签: implementation algorithm frequency the
上传时间: 2017-04-12
上传用户:klin3139
MATLAB implementation of time series prediction Based on the VQTAM method described in the following papers: G. A. Barreto & A. F. R. Araujo (2004) "Identification and Control of Dynamical Systems Using the Self-Organizing Map" IEEE Transactions on Neural Networks, vol. 15, no. 5.
标签: implementation prediction described following
上传时间: 2013-12-22
上传用户:windwolf2000
this is used to get the alarm on the mobile you watch
上传时间: 2017-04-18
上传用户:咔乐坞