Welcome![Sign In][Sign Up]
Location:
Search - java dh

Search list

[Other resourceANtsP2P_beta1.5.6_p0.9.3_src_nb

Description: ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others. Features Open Source Java implementation (GNU-GPL license) Multiple sources download Swarming from partial files Automatic resume and sources research over the net Search by hash, string and structured query Completely Object-Oriented routing protocol Point to Point secured comunication: DH(512)-AES(128) EndPoint to EndPoint secured comunication: DH(512)-AES(128) Serverless GWebCache-based peer dicovery procedure IRC based peer discovery system IRC embeded chat system Full text search of indexed documents (pdf, html, txt, doc etc) -> QUERY REFERENCE. Distributed/Decentralized Search engine HTTP tunneling ANts allow P2P communications through any kind of HTTP Proxy ANts allow P2P communications through any kind of NAT or traffic filtering system -ANts P2P realizes a third generation P2P ne t. It protects your privacy while you are connec ted and makes you not trackable, hiding your identity (ip) and crypting everyth ing you are sending / receiving from others. Fea tures Open Source Java implementation (GNU-GP L license) Multiple sources download Fog from Automatic resume partial files and source 's research over the net Search by hash. and structured query string Completely Object - Oriented routing protocol Point to Point secu red comunication : DH (512) - AES (128) EndPoint to secure EndPoint d comunication : DH (512) - AES (128) Serverless GWebCache-base d peer dicovery procedure IRC based peer discov ery system IRC chat system embeded Full text sea rch of indexed documents (pdf, html, txt, doc etc) -
Platform: | Size: 7742358 | Author: 谭朋柳 | Hits:

[Internet-Network20061011

Description: Java编写的DHCP服务器和客户端程序.附带有文档说明。-Java prepared by the DHCP server and client programs. Documents submitted with the note.
Platform: | Size: 187392 | Author: sand | Hits:

[P2PANtsP2P_beta1.5.6_p0.9.3_src_nb

Description: ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others. Features Open Source Java implementation (GNU-GPL license) Multiple sources download Swarming from partial files Automatic resume and sources research over the net Search by hash, string and structured query Completely Object-Oriented routing protocol Point to Point secured comunication: DH(512)-AES(128) EndPoint to EndPoint secured comunication: DH(512)-AES(128) Serverless GWebCache-based peer dicovery procedure IRC based peer discovery system IRC embeded chat system Full text search of indexed documents (pdf, html, txt, doc etc) -> QUERY REFERENCE. Distributed/Decentralized Search engine HTTP tunneling ANts allow P2P communications through any kind of HTTP Proxy ANts allow P2P communications through any kind of NAT or traffic filtering system -ANts P2P realizes a third generation P2P ne t. It protects your privacy while you are connec ted and makes you not trackable, hiding your identity (ip) and crypting everyth ing you are sending/receiving from others. Fea tures Open Source Java implementation (GNU-GP L license) Multiple sources download Fog from Automatic resume partial files and source 's research over the net Search by hash. and structured query string Completely Object- Oriented routing protocol Point to Point secu red comunication : DH (512)- AES (128) EndPoint to secure EndPoint d comunication : DH (512)- AES (128) Serverless GWebCache-base d peer dicovery procedure IRC based peer discov ery system IRC chat system embeded Full text sea rch of indexed documents (pdf, html, txt, doc etc)-
Platform: | Size: 7742464 | Author: 谭朋柳 | Hits:

[Crack HackSymmetric_encryption_Stream_encryption_CBC_RSA_DH.

Description: 对称加密解密,流加密,CBC加密解密,RSA加密算法,DH公钥和私钥算法-Symmetric encryption and decryption, stream encryption, CBC encryption and decryption, RSA encryption algorithm, DH public key and private key algorithm
Platform: | Size: 19456 | Author: Peter | Hits:

[Crack HackDH

Description: Step 1: Generating a Parameter Set for the Diffie‐Hellman Key Agreement Algorithm Step 2: Generating a Secret Key Using the Diffie‐Hellman Key Agreement Algorithm Step 3: Use UDP to exchange DH public key Step 4: Establish an AES‐256 encrypted channel using UDP and deliver one encrypted file Step 5: Establish an AES‐256 encrypted channel using TCP and deliver one encrypted file -Step 1: Generating a Parameter Set for the Diffie‐Hellman Key Agreement Algorithm Step 2: Generating a Secret Key Using the Diffie‐Hellman Key Agreement Algorithm Step 3: Use UDP to exchange DH public key Step 4: Establish an AES‐256 encrypted channel using UDP and deliver one encrypted file Step 5: Establish an AES‐256 encrypted channel using TCP and deliver one encrypted file
Platform: | Size: 128000 | Author: Tong Liu | Hits:

[Crack HackJavaSecurity

Description: java 安全相关 包括 base64,MD5 RSA 等-Java Security and MD5 RSA Base64 DH,DESA just a jar
Platform: | Size: 45056 | Author: 魏铮铮 | Hits:

[JSP/JavaDiffie-Hellman-Key-Exchange-between-3-Parties

Description: Java code to implement DH Key Exchange with 3 parties
Platform: | Size: 8192 | Author: kamatchi | Hits:

[Crack HackBasicDHExample

Description: A Basic DH source code in Java
Platform: | Size: 1024 | Author: Yohan | Hits:

[Crack HackDH

Description: DH加密算法完整版 信息安全方面的知识 java编程-DH encryption algorithm full version information security knowledge of java programming
Platform: | Size: 7168 | Author: 王海彬 | Hits:

[OS programdiffhell

Description: 实习内容 基于Diffle-Human的密钥交换 1 问题描述: Diffle-Human算法是建立在DH公钥和私钥基础上的密钥分配算法,如A需要和B共享密钥时,A和B各自生成DH的公钥和私钥,公钥对外公布而私钥各自秘密保存 2 基本要求 在java平台上实现基于Diffle-Human的密钥交换- Practical content-based key exchange Diffle-Human A description of the problem: Diffle-Human algorithm is established in the DH key distribution method based on a public key and a private key, such as when A and B need to share the key, A, and B are generated DH public key and private key, public key and private announced each key is kept secret Two basic requirements Implemented on a java-based platform Diffle-Human key exchange
Platform: | Size: 2048 | Author: 杨平 | Hits:

CodeBus www.codebus.net