A Philosophy of SECURITY Management
标签: Philosophy Management SECURITY of
上传时间: 2017-07-27
上传用户:sclyutian
SECURITY Java Chat. This is SECURITY simple console chat written in java.
标签: SECURITY SECURITY console written
上传时间: 2013-12-05
上传用户:wlcaption
Linux rootkits basics for the beginners. Very good information for the newbiies in the SECURITY world.
标签: the information for beginners
上传时间: 2013-12-17
上传用户:gtzj
md5 类实现了RSA Data SECURITY, Inc.在提交给IETF 的RFC1321中的MD5 message-digest 算法。
标签: message-digest SECURITY Data 1321
上传时间: 2017-09-16
上传用户:ynwbosss
example of SECURITY system
标签: SECURITY example system of
上传时间: 2014-01-01
上传用户:hoperingcong
this book is about the concerns about RFiD SECURITY and privacy and includes solutions.
标签: about and solutions concerns
上传时间: 2014-01-13
上传用户:爱死爱死
Good SECURITY provider by using biometric feature as key. This is the program of server.
标签: biometric SECURITY provider feature
上传时间: 2013-12-07
上传用户:c12228
An Overview of Smart Card SECURITY. The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but computational capability as well. The self-containment of smart card makes it resistant to attack as it does not need to depend upon potentially vulnerable external resources. Because of this characteristic, smart cards are often used in different applications which require strong SECURITY protection and authentication.
标签: card intelligent Overview SECURITY
上传时间: 2017-09-25
上传用户:busterman
Java 2 Network SECURITY.
上传时间: 2013-12-24
上传用户:wys0120
The ever-increasing demand for private and sensitive data transmission over wireless net- works has made SECURITY a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have tried hard to continuously come up with improved crypto- graphic algorithms. But typically we do not need to wait too long to find an efficient way to crack these algorithms. With the rapid progress of computational devices, the current cryptographic methods are already becoming more unreliable. In recent years, wireless re- searchers have sought a new SECURITY paradigm termed physical layer SECURITY. Unlike the traditional cryptographic approach which ignores the effect of the wireless medium, physi- cal layer SECURITY exploits the important characteristics of wireless channel, such as fading, interference, and noise, for improving the communication SECURITY against eavesdropping attacks. This new SECURITY paradigm is expected to complement and significantly increase the overall communication SECURITY of future wireless networks.
标签: Communications Physical SECURITY Wireless Layer in
上传时间: 2020-05-31
上传用户:shancjb