information security as an auxiliary tool, mainly for the initialization USBKEY. USBKEY storage so that users of relevant information. Update : 2025-03-16
Size : 73kb
Publisher : clzhou
in WIN-TC using C code written in the importation of small procedures. SCM can be used to login verification. Update : 2025-03-16
Size : 1kb
Publisher : dengxuebo
communications networks in the two ends, the two sides agreed unanimously the Key, In communications with the source Key to the core DES data encryption, Then a password in the form of public communication networks (such Update : 2025-03-16
Size : 4kb
Publisher : fang
open source encryption software. The latest version! ! The creation of an internal document diversification and disk encryption to be configured as a drive through a drive to visit asked the virtual disk. Any stored in t Update : 2025-03-16
Size : 1.13mb
Publisher : 余伟
Multicast key batch update algorithm, Based on the LKH single Rekeying program and the program Batch Rekeying principle, Rekeying structure and processes. And Batch Rekeying focused on the performance of the program with Update : 2025-03-16
Size : 4.28mb
Publisher : 宋克宁
MD5 algorithm. MD5 to 512 groups to deal with the importation of information and each group was also divided into 16 groups of 32 seats, After a series of processing, the output from the algorithm 4 32 subgroups, 4 32 th Update : 2025-03-16
Size : 7kb
Publisher : 杨昆