资源列表

« 1 2 ... .88 .89 .90 .91 .92 4293.94 .95 .96 .97 .98 ... 16925 »

[编程文档sso

说明:
<lzrzhao> 在 2025-11-11 上传 | 大小:39kb | 下载:0

[编程文档ladp

说明:有关于ldap的名词解释 Ldap term on the interpretation of-Ldap term on the interpretation of
<lzrzhao> 在 2025-11-11 上传 | 大小:15kb | 下载:0

[文档资料CryptanalysisofHwang-ChangsaTime-StampProtocolforD

说明:Cryptanalysis of Hwang-Changs a Time-Stamp Protocol for Digital Watermarking-In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit watermarking. They claimed that their scheme is secure against attacks. However, in this article,
<xiaowang> 在 2025-11-11 上传 | 大小:387kb | 下载:0

[软件工程FPGA_8051core

说明:FPGA中嵌入8051单片机核的具体操作方法,有图示说明。-8051 single-chip FPGA embedded in the concrete operation of nuclear, there are icons that.
<zhouqing> 在 2025-11-11 上传 | 大小:267kb | 下载:0

[文档资料OnDesignatedlyVerifiedNon-interactive)Watermarking

说明:On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is a possible solution for this
<xiaowang> 在 2025-11-11 上传 | 大小:142kb | 下载:0

[文档资料FromWeaktoStrongWatermarking

说明:From Weak to Strong Watermarking-The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the conte
<xiaowang> 在 2025-11-11 上传 | 大小:306kb | 下载:0

[文档资料CryptanalysisofaNewChaoticCryptosystemBasedonErgod

说明:Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity-This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack.
<xiaowang> 在 2025-11-11 上传 | 大小:173kb | 下载:0

[文档资料Cryptanalysisofanimageencryptionscheme

说明:Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed
<xiaowang> 在 2025-11-11 上传 | 大小:246kb | 下载:0

[文档资料UsingvisualtagstobypassBluetoothdevicediscovery.ra

说明:Using visual tags to bypass Bluetooth device discovery.-One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth
<nihao> 在 2025-11-11 上传 | 大小:196kb | 下载:0

[文档资料HandoffsupportformobilitywithIPoverBluetooth

说明:Handoff support for mobility with IP over Bluetooth-One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth conn
<wang> 在 2025-11-11 上传 | 大小:1mb | 下载:0

[文档资料InterferenceevaluatioofBluetoothandIEEE802.11bsyst

说明:Interference evaluation of Bluetooth and IEEE 802.11 b systems-The emergence of several radio technologies, such as Bluetooth and IEEE 802.11, operating in the 2.4 GHz unlicensed ISM frequency band, may lead to signal interference and result
<nihao> 在 2025-11-11 上传 | 大小:191kb | 下载:0

[文档资料MultihopscatternetformationforBluetoothnetworks1.r

说明:Multihop scatternet formation for Bluetooth networks-Bluetooth Paper:Multihop scatternet formation for Bluetooth networks
<wang> 在 2025-11-11 上传 | 大小:460kb | 下载:0
« 1 2 ... .88 .89 .90 .91 .92 4293.94 .95 .96 .97 .98 ... 16925 »

源码中国 www.ymcn.org