搜索资源列表
Secure Web Forms with Client-Side Signatures
- The World Wide Web is evolving from a platform for infor- mation access into a platform for interactive services. The interaction of the services is provided by forms. Some of these services, such as bank- ing and e-commerce, require secure, non-repu
serverclient
- 安全文件传输,基于arm2440的文件的上传下载,修改,重命名,界面采用QT实现,希望多大家能有所帮组-Secure File Transfer, based on the upload documents arm2440 download, modify, rename, interface implementation using QT, I hope everyone can be helped many groups
Secure-Programs-HOWTO-all-html.tar
- Secure Programming howtos. How to write code that is not likely to be exploited by buffer overflows, format-strings, etc. How to write stable quality code.
104
- This an intrusion detection code. I hope this will help people doing work in IDS with secure aodv-This is an intrusion detection code. I hope this will help people doing work in IDS with secure aodv..
Writing_Secure_Code
- Writing Secure Code 英文版, 很好的原版书,读读吧-Writing Secure Code in English, very good original book
0321424778_Addison.Wesley_-_Secure.Programming.wi
- Secure Coding Standard from Cert
SECURE_LEACH_ROUTING_PROTOCOL_BASED_ON_LOW-POWER_
- ABSTRACT In this paper we put forward a kind of secure LEACH routing protocol (SC-LEACH) based on low-power clusterhead selection algorithm. This protocol gets the total number of all nodes by their collaboration in selecting, to precisely calculat
Secure_Mobile_Payment_System_in_Wireless_Environm
- Secure Mobile Payment System inWireless Environment
SSHUnix-Secure-Shell
- 本书专门介绍了Secure Shell(SSH)工具。SSH包括三个主要部分:UNIX进程、TCP/IP网络以及加密。它改善了UNIX的不足,并使安全性管理的复杂程度降到很低。-This book introduces the special Secure shells (SSH) tool. SSH includes three main parts: UNIX process, TCP/IP network and encryption. It has improved, and the s
SECURE-LEACH-ROUTING-PROTOCOL-BASED-ON-LOW-POWER-
- SECURE LEACH ROUTING PROTOCOL BASED ON LOW-POWER CLUSTER-HEAD
Secure-Computer-and-Network-Systems-Modeling-Anal
- Secure Computer and Network Systems Modeling Analysis and Design
A-SURVEY-OF-CHAOTIC-SECURE-COMMUNICATION
- A SURVEY OF CHAOTIC SECURE COMMUNICATION
Java-Project-on-SECURE-INTERCONNECTION-OF-LDAP-AN
- project report on Java-Project-on-SECURE-INTERCONNECTION-OF-LDAP-AND-DNSSEC-PKI-WITHIN-INTERNET
(MSPress)-Writing-Secure-Code
- Writing Secure Code MSPre-Writing Secure Code MSPress
Secure-LAN-Communicator-a-Net-Project
- Secure LAN Communicator
provable-secure-neighbor-discovery-wireless.pdf.z
- provable secure neighbor discovery wirele-provable secure neighbor discovery wireless
Secure-On-Demand-Distance-Vector-Routing--in-Ad-H
- Secure On Demand Distance Vector Routing in Ad Hoc Networks-Secure On Demand Distance Vector Routing in Ad Hoc Networks
secure-data-communication-manet.pdf
- secure data communication manet
secure-message-transmission-manet.pdf
- secure message transmission manet
FIPS---Secure-Hash-Standard
- Document contains implementation details to implement Secure Hash Function for networking.