-
COBRA cipher algorithm example.
COBRA cipher algorithm example.
- 2022-03-06 21:09:35下载
- 积分:1
-
blind input method, using Microsoft's TTS achieve blind calligraphy
盲人输入法,利用微软的TTS实现盲人书法-blind input method, using Microsoft"s TTS achieve blind calligraphy
- 2022-02-01 23:05:14下载
- 积分:1
-
Multicast key batch update algorithm, Based on the LKH single Rekeying program a...
组播密钥的批次更新算法,基于LKH的单次密钥更新方案和Batch Rekeying方案的原理、结构和密钥更新过程等。并着重对 Batch Rekeying 方案的性能与单次密钥更新方案作了简单的比较。
通过比较和分析得到结论:定时更新的Batch Rekeying 方案在更新开销上比单次更新更有优势
-Multicast key batch update algorithm, Based on the LKH single Rekeying program and the program Batch Rekeying principle, Rekeying structure and processes. And Batch Rekeying focused on the performance of the program with a single Rekeying program with a simple comparison. By comparing and analyzing conclusions : regularly updated Batch Rekeying program in the updated overhead than a single update more advantages
- 2022-03-12 16:24:24下载
- 积分:1
-
delphi加密组件
delphi加密组件-delphi encryption components
- 2022-03-24 01:44:51下载
- 积分:1
-
PE程序加密壳源程序
PE程序加密壳源程序 -PE procedure encryption shell source program
- 2022-08-13 03:42:19下载
- 积分:1
-
JAVA中license控制实现实例
现在很多J2EE应用都采用一个license文件来授权系统的使用,特别是在系统购买的早期,会提供有限制的license文件对系统进行限制,比如试用版有譬如IP、日期、最大用户数量的限制等。 而License文件中的Base64或BEA公司现在是WebLo
- 2022-10-16 11:30:03下载
- 积分:1
-
ABE加密(Attribute
ABE加密(Attribute-Based Encryption)算法的一种实现方案-Source code for ABE(Attribute-Based Encryption)
- 2022-05-15 00:41:47下载
- 积分:1
-
代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
- 2023-06-18 10:00:03下载
- 积分:1
-
OllyDbg中文帮助发布于: 2004.12.24(看雪)文件名:OllyDbg.hlpMD5值:375d4bbe751f28e3f3bf7c5d2446c0...
OllyDbg中文帮助发布于: 2004.12.24(看雪)文件名:OllyDbg.hlpMD5值:375d4bbe751f28e3f3bf7c5d2446c09a发布时间:2004.12.25翻译:TT小组曾经参与 OllyDbg 文档翻译工作的人员(按字母顺序):babyfox (是他第一次尝试翻译完全部OllyDbg)cyclotron[TT]flykuangtudazuo[TT]kvllzonlyu[TT]rigley[TT]Roba[TT]SwordLea[TT]zdd[TT]ZMWorm[TT] zmworm@sohu.com -OllyDbg Chinese help in the release : Dec.24, 2004 (See snow) File Name : OllyDbg.hlpMD5 value : 375d4bbe751f28e3f3bf7c5d2446c09a Release time : 2004.12.25 Translation : TT OllyDbg group had been involved in the translation of documents (in alphabetical order) : babyfox (yes his first attempt to fully translate the Department OllyDbg) cyclotron flykuangtudazuo [TT] [TT] kvllzonlyu rigley [TT] [TT] Roba SwordLea [TT] [TT] zdd ZMWorm [TT] [TT] zmworm@sohu.com
- 2023-01-09 02:20:03下载
- 积分:1
-
一个3des算法的库文件和使用库文件的例子
一个3des算法的库文件和使用库文件的例子- A 3des algorithm storehouse document and use storehouse
document example
- 2022-02-24 15:06:22下载
- 积分:1