Location:
Search - java dh
Search list
Description: ANts P2P realizes a third generation P2P net.
It protects your privacy while you are connected and makes you not trackable,
hiding your identity (ip) and crypting everything you are sending/receiving from others.
Features
Open Source Java implementation (GNU-GPL license)
Multiple sources download
Swarming from partial files
Automatic resume and sources research over the net
Search by hash, string and structured query
Completely Object-Oriented routing protocol
Point to Point secured comunication: DH(512)-AES(128)
EndPoint to EndPoint secured comunication: DH(512)-AES(128)
Serverless GWebCache-based peer dicovery procedure
IRC based peer discovery system
IRC embeded chat system
Full text search of indexed documents (pdf, html, txt, doc etc) -> QUERY REFERENCE.
Distributed/Decentralized Search engine
HTTP tunneling
ANts allow P2P communications through any kind of HTTP Proxy
ANts allow P2P communications through any kind of NAT or traffic filtering system
-ANts P2P realizes a third generation P2P ne t. It protects your privacy while you are connec ted and makes you not trackable, hiding your identity (ip) and crypting everyth ing you are sending / receiving from others. Fea tures Open Source Java implementation (GNU-GP L license) Multiple sources download Fog from Automatic resume partial files and source 's research over the net Search by hash. and structured query string Completely Object - Oriented routing protocol Point to Point secu red comunication : DH (512) - AES (128) EndPoint to secure EndPoint d comunication : DH (512) - AES (128) Serverless GWebCache-base d peer dicovery procedure IRC based peer discov ery system IRC chat system embeded Full text sea rch of indexed documents (pdf, html, txt, doc etc) -
Platform: |
Size: 7742358 |
Author: 谭朋柳 |
Hits:
Description: Java编写的DHCP服务器和客户端程序.附带有文档说明。-Java prepared by the DHCP server and client programs. Documents submitted with the note.
Platform: |
Size: 187392 |
Author: sand |
Hits:
Description: ANts P2P realizes a third generation P2P net.
It protects your privacy while you are connected and makes you not trackable,
hiding your identity (ip) and crypting everything you are sending/receiving from others.
Features
Open Source Java implementation (GNU-GPL license)
Multiple sources download
Swarming from partial files
Automatic resume and sources research over the net
Search by hash, string and structured query
Completely Object-Oriented routing protocol
Point to Point secured comunication: DH(512)-AES(128)
EndPoint to EndPoint secured comunication: DH(512)-AES(128)
Serverless GWebCache-based peer dicovery procedure
IRC based peer discovery system
IRC embeded chat system
Full text search of indexed documents (pdf, html, txt, doc etc) -> QUERY REFERENCE.
Distributed/Decentralized Search engine
HTTP tunneling
ANts allow P2P communications through any kind of HTTP Proxy
ANts allow P2P communications through any kind of NAT or traffic filtering system
-ANts P2P realizes a third generation P2P ne t. It protects your privacy while you are connec ted and makes you not trackable, hiding your identity (ip) and crypting everyth ing you are sending/receiving from others. Fea tures Open Source Java implementation (GNU-GP L license) Multiple sources download Fog from Automatic resume partial files and source 's research over the net Search by hash. and structured query string Completely Object- Oriented routing protocol Point to Point secu red comunication : DH (512)- AES (128) EndPoint to secure EndPoint d comunication : DH (512)- AES (128) Serverless GWebCache-base d peer dicovery procedure IRC based peer discov ery system IRC chat system embeded Full text sea rch of indexed documents (pdf, html, txt, doc etc)-
Platform: |
Size: 7742464 |
Author: 谭朋柳 |
Hits:
Description: 对称加密解密,流加密,CBC加密解密,RSA加密算法,DH公钥和私钥算法-Symmetric encryption and decryption, stream encryption, CBC encryption and decryption, RSA encryption algorithm, DH public key and private key algorithm
Platform: |
Size: 19456 |
Author: Peter |
Hits:
Description: Step 1: Generating a Parameter Set for the Diffie‐Hellman Key Agreement Algorithm
Step 2: Generating a Secret Key Using the Diffie‐Hellman Key Agreement Algorithm
Step 3: Use UDP to exchange DH public key
Step 4: Establish an AES‐256 encrypted channel using UDP and deliver one encrypted file
Step 5: Establish an AES‐256 encrypted channel using TCP and deliver one encrypted file
-Step 1: Generating a Parameter Set for the Diffie‐Hellman Key Agreement Algorithm
Step 2: Generating a Secret Key Using the Diffie‐Hellman Key Agreement Algorithm
Step 3: Use UDP to exchange DH public key
Step 4: Establish an AES‐256 encrypted channel using UDP and deliver one encrypted file
Step 5: Establish an AES‐256 encrypted channel using TCP and deliver one encrypted file
Platform: |
Size: 128000 |
Author: Tong Liu |
Hits:
Description: java 安全相关 包括 base64,MD5
RSA 等-Java Security and MD5
RSA Base64 DH,DESA just a jar
Platform: |
Size: 45056 |
Author: 魏铮铮 |
Hits:
Description: Java code to implement DH Key Exchange with 3 parties
Platform: |
Size: 8192 |
Author: kamatchi |
Hits:
Description: A Basic DH source code in Java
Platform: |
Size: 1024 |
Author: Yohan |
Hits:
Description: DH加密算法完整版
信息安全方面的知识
java编程-DH encryption algorithm full version information security knowledge of java programming
Platform: |
Size: 7168 |
Author: 王海彬 |
Hits:
Description: 实习内容 基于Diffle-Human的密钥交换
1 问题描述:
Diffle-Human算法是建立在DH公钥和私钥基础上的密钥分配算法,如A需要和B共享密钥时,A和B各自生成DH的公钥和私钥,公钥对外公布而私钥各自秘密保存
2 基本要求
在java平台上实现基于Diffle-Human的密钥交换-
Practical content-based key exchange Diffle-Human
A description of the problem:
Diffle-Human algorithm is established in the DH key distribution method based on a public key and a private key, such as when A and B need to share the key, A, and B are generated DH public key and private key, public key and private announced each key is kept secret
Two basic requirements
Implemented on a java-based platform Diffle-Human key exchange
Platform: |
Size: 2048 |
Author: 杨平 |
Hits: