资源列表
[文档资料] CryptanalysisofHwang-ChangsaTime-StampProtocolforD
说明:Cryptanalysis of Hwang-Changs a Time-Stamp Protocol for Digital Watermarking-In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit watermarking. They claimed that their scheme is secure against attacks. However, in this article,<xiaowang> 在 2025-11-11 上传 | 大小:387kb | 下载:0
[软件工程] FPGA_8051core
说明:FPGA中嵌入8051单片机核的具体操作方法,有图示说明。-8051 single-chip FPGA embedded in the concrete operation of nuclear, there are icons that.<zhouqing> 在 2025-11-11 上传 | 大小:267kb | 下载:0
[文档资料] OnDesignatedlyVerifiedNon-interactive)Watermarking
说明:On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is a possible solution for this<xiaowang> 在 2025-11-11 上传 | 大小:142kb | 下载:0
[文档资料] FromWeaktoStrongWatermarking
说明:From Weak to Strong Watermarking-The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the conte<xiaowang> 在 2025-11-11 上传 | 大小:306kb | 下载:0
[文档资料] CryptanalysisofaNewChaoticCryptosystemBasedonErgod
说明:Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity-This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack.<xiaowang> 在 2025-11-11 上传 | 大小:173kb | 下载:0
[文档资料] Cryptanalysisofanimageencryptionscheme
说明:Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed<xiaowang> 在 2025-11-11 上传 | 大小:246kb | 下载:0
[文档资料] UsingvisualtagstobypassBluetoothdevicediscovery.ra
说明:Using visual tags to bypass Bluetooth device discovery.-One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth<nihao> 在 2025-11-11 上传 | 大小:196kb | 下载:0
[文档资料] HandoffsupportformobilitywithIPoverBluetooth
说明:Handoff support for mobility with IP over Bluetooth-One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth conn<wang> 在 2025-11-11 上传 | 大小:1mb | 下载:0
[文档资料] InterferenceevaluatioofBluetoothandIEEE802.11bsyst
说明:Interference evaluation of Bluetooth and IEEE 802.11 b systems-The emergence of several radio technologies, such as Bluetooth and IEEE 802.11, operating in the 2.4 GHz unlicensed ISM frequency band, may lead to signal interference and result<nihao> 在 2025-11-11 上传 | 大小:191kb | 下载:0
[文档资料] MultihopscatternetformationforBluetoothnetworks1.r
说明:Multihop scatternet formation for Bluetooth networks-Bluetooth Paper:Multihop scatternet formation for Bluetooth networks<wang> 在 2025-11-11 上传 | 大小:460kb | 下载:0