Welcome![Sign In][Sign Up]
Location:
Search - CRYPT

Search list

[CA authjm

Description: 一,产生密钥(算法实现可参照文档后的<附件1>KeyGeN.asp) 与<附件1>不同的是,实际要求密钥存放在字符串接受方数据库表KeyPool中,表结构如下: 1,personalID{主码} 2,secret_key{密钥,数据类型最好用text,与实际代码密钥生成长度有关} 3,serverTime{密钥生成时间,用以检验密钥是否失效} 接受方发现密钥失效,则拒绝验证 二,字符串加密(算法实现可参照文档后的<附件2>CRYPT.asp) 从数据库中读取密钥,并用密钥加密{函数:EnCrypt(正文),返回密文} 三,接受方获取密文以及其他数据以后,根据获取的参数personalID从数据库中读取密钥,并且比较时间戳,发现密钥超时(比如15分钟)则拒绝验证。 时间戳有效,则使用密钥解密{函数:DeCrypt(密文),返回正文}-First, the key generation (algorithm can refer to the document after <Annex 1> KeyGeN.asp) And <Annex 1> The difference is that the actual requirements of the key stored in a database table KeyPool string recipient, the table structure is as follows: 1, personalID {main} code 2, secret_key {key, data type, preferably with text, key generation and the actual code length about} 3, serverTime {key generation time, to test whether the key failure} Recipient found key lapses, refused to verify Second, string encryption (algorithm can refer to the document after <Attachment 2> CRYPT.asp) Key is read from the database and use the key to encrypt {function: EnCrypt (text) returns ciphertext} Third, the recipient, and other data acquired after the ciphertext, based on the parameters acquired personalID key read from the database, and compares the timestamp found key timeout (eg 15 minutes) the authentication is denied. Timestamp is valid, then use the key
Platform: | Size: 5120 | Author: 蔡国庆 | Hits:

[DocumentsAssurance-System-in-Traditional-Body-Area-Network

Description: Rapid progression of wireless engineering systems, a special domain of sensor network which supports medical diligences is the development of Autonomous Wireless Body Area Network. In this type of environment such as monitoring the health condition of senior citizens .The sensed signal can monitor several types of measurements such as Electroencephalography (EEG), Electrocardiography (ECG), Electromyography (EMG), Skin temperature, Skin conductance or Electrooculography (EOG) etc., compares with the standard level and the information is passed to the care takers or hospital for further necessary actions using a hybrid network of cryptography nowadays are crucial. The privacy information is vital and they have to be safe guarded from several aggressors. We propose a method of crypt analyst method using a cluster pattern of key mechanism provides assure, efficient and improved way to increase the lifetime of the network.-Rapid progression of wireless engineering systems, a special domain of sensor network which supports medical diligences is the development of Autonomous Wireless Body Area Network. In this type of environment such as monitoring the health condition of senior citizens .The sensed signal can monitor several types of measurements such as Electroencephalography (EEG), Electrocardiography (ECG), Electromyography (EMG), Skin temperature, Skin conductance or Electrooculography (EOG) etc., compares with the standard level and the information is passed to the care takers or hospital for further necessary actions using a hybrid network of cryptography nowadays are crucial. The privacy information is vital and they have to be safe guarded from several aggressors. We propose a method of crypt analyst method using a cluster pattern of key mechanism provides assure, efficient and improved way to increase the lifetime of the network.
Platform: | Size: 267264 | Author: Opencvresearcher | Hits:

[Linux-UnixCipherSymmetricCryptHelper

Description: Cipher Symmetric Crypt Helper Source Code for Linux.
Platform: | Size: 2048 | Author: xingdongun | Hits:

[Crack HackDesktop

Description: for crypt.h decrytion for ran online use your own ski-for crypt.h decrytion for ran online use your own skill
Platform: | Size: 29696 | Author: Johnny | Hits:

[Crack HackCSharpAES

Description: AES Crypt,Decrypt C#
Platform: | Size: 836608 | Author: www | Hits:

[Crack HackAES_JAVA_src

Description: AES Crypt Decrypt JAVA Source code
Platform: | Size: 1024 | Author: www | Hits:

[SCMSmart-CRD

Description: Test for the crypt & decript functions of TSmartCard by 3 Emme System. You must copy the CRYPTO.DLL in your C:\Windows\System or C:\Delphi\Bin directory. }- Test for the crypt & decript functions of TSmartCard by 3 Emme System. You must copy the CRYPTO.DLL in your C:\Windows\System or C:\Delphi\Bin directory. }
Platform: | Size: 454656 | Author: Lookze | Hits:

[Software EngineeringMD5-Checker

Description: Tool for Crypt MD5 easy to use.Small file and not install.
Platform: | Size: 9216 | Author: TheShogun | Hits:

[JSP/Javacrypt.java

Description: 加密解密文件,支持AES128/AES256/ECB/CBC等-encrypt/decrypt file
Platform: | Size: 1024 | Author: tony | Hits:

[Linux-Unixieee80211_crypt_ccmp

Description: Host AP crypt: host-based CCMP encryption implementation for Host AP driver.
Platform: | Size: 4096 | Author: xlzengks | Hits:

[Linux-Unixlib80211_crypt_wep

Description: lib80211 crypt: host-based WEP encryption implementation for lib80211.
Platform: | Size: 3072 | Author: zryvxx | Hits:

[Linux-Unixcrypt

Description: Do not remove this function even if no one is using it as this is an example of how to get notifications about new connector user registration.
Platform: | Size: 2048 | Author: vonbeiln | Hits:

[Linux-Unixlib80211_crypt_ccmp

Description: lib80211 crypt: host-based CCMP encryption implementation for lib80211.
Platform: | Size: 4096 | Author: znfurk | Hits:

[Software Engineering06779838

Description: Cancer, (uncontrolled cell proliferation), has demonstrably high impact on human life: complex feelings and lifestyle changes, caused by malignancy, affect not only patients, but also family and friends. Cancer origin has been linked to genetic and epigenetic abnormalities that target stem cells. Here, we introduce an agent-based model for colon crypt dynamics
Platform: | Size: 279552 | Author: Hokietond | Hits:

[Linux-Unixieee80211_crypt_wep

Description: Host AP crypt: host-based WEP encryption implementation for Host AP driver.
Platform: | Size: 2048 | Author: fenzorao | Hits:

[EditBoxXOR.RAR

Description: It XOR every file you want do crypt. It does it very fast.
Platform: | Size: 12288 | Author: 2al5no | Hits:

[CA authmd5

Description: Md5 Crypt Matlab code
Platform: | Size: 2048 | Author: Ngon | Hits:

[CA authimage-encryption-and-decryption-using-blowfish-al

Description: Matlabcode blowfish crypt
Platform: | Size: 665600 | Author: Ngon | Hits:

[Technology Managementblowfish-HoThanhNguyen

Description: Matlabcode blowfish crypt al
Platform: | Size: 855040 | Author: Ngon | Hits:

[LabViewSmallHttpServer

Description: SmallHTTPSvers Lab Crypt
Platform: | Size: 3117056 | Author: Ngon | Hits:
« 1 2 ... 10 11 12 13 14 1516 17 18 »

CodeBus www.codebus.net