CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Crack Hack
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Crack Hack list
Sort by :
«
1
2
...
.84
.85
.86
.87
.88
689
.90
.91
.92
.93
.94
...
1665
»
AES
Downloaded:0
AES encryption implementation, code more, but the feature is full, meet all the needs of
Update
: 2025-02-01
Size
: 229kb
Publisher
:
suchongmao
IIS6.0
Downloaded:0
Student achievement management system
Update
: 2025-02-01
Size
: 7.66mb
Publisher
:
why
ECC
Downloaded:0
The full version of elliptic curve encryption algorithm, with C++ implementation, including key generation, encryption and decryption of files, can complete run ~
Update
: 2025-02-01
Size
: 1.33mb
Publisher
:
lixiang
AES
Downloaded:0
The full version of AES encryption and decryption algorithm, switch the key 128,192,256. Smooth running, beautiful interface ~
Update
: 2025-02-01
Size
: 390kb
Publisher
:
lixiang
Md5a_Tool
Downloaded:0
the md5 program used for check some file is same or not
Update
: 2025-02-01
Size
: 78kb
Publisher
:
DES_code_c
Downloaded:0
In visual studio 2005 environment, the development of a DES encryption and decryption process, using the C language, can be completed. Txt file encryption and decryption operations, does not support the pdf and other fil
Update
: 2025-02-01
Size
: 250kb
Publisher
:
lw
DES_reference_GUI
Downloaded:0
DES encryption and decryption procedures, user interface, including the development of the MFC under VC6 procedures.
Update
: 2025-02-01
Size
: 281kb
Publisher
:
lw
RC4
Downloaded:0
RC4 algorithm。 designed with C。first it run at VC6.0 .nOW it can run at VS08
Update
: 2025-02-01
Size
: 1kb
Publisher
:
Peng
mima
Downloaded:0
C#, graphical interface to the file encryption and decryption operations
Update
: 2025-02-01
Size
: 277kb
Publisher
:
protocol_anomaly_detection
Downloaded:0
This white paper aims at briefly describing the technologies currently used in filter design in Network-based Intrusion Detection System (NIDS). We will consider the advantages and drawbacks of using signature filters ve
Update
: 2025-02-01
Size
: 17kb
Publisher
:
sinsin
protocol-anomaly-detection-network-based-intrusio
Downloaded:0
A taxonomy was developed by Axelsson to define the space of intrusion detection technology and classify IDSs. The taxonomy categorizes IDSs by their detection principle and their operational aspects. The two main categor
Update
: 2025-02-01
Size
: 81kb
Publisher
:
sinsin
kww
Downloaded:0
Chaotic system to achieve ultra video encryption method designed by discrete cosine transform
Update
: 2025-02-01
Size
: 561kb
Publisher
:
王丽丽
«
1
2
...
.84
.85
.86
.87
.88
689
.90
.91
.92
.93
.94
...
1665
»
CodeBus
is the largest source code store in internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.