搜索资源列表
ov9715
- 100万像素的CMOS SENSOR 应用于汽车 安防等重要行业-1-megapixel CMOS SENSOR important industries such as automotive security
Internet_Protocol_Event_Reporting
- SIA Digital Communication Standard – Internet Protocol Event Reporting 对做安防的人有用.-SIA Digital Communication Standard- Internet Protocol Event Reporting on people who do useful security.
MSM7512B_CN
- MSM7512B 可用于ITU-T .23调制解调器(如低价格的内置调制解调器)、远程控制系统、 家庭安全系统等-MSM7512B can be used for ITU-T .23 modem (such as low prices, built-in modem), remote control systems, home security systems, etc.
11
- 此文件为我网络安全方面的理论知识,有兴许的朋友可以-This file for my network security aspects of the theory of knowledge, there is perhaps a friend can look at the
12
- 此文件为我网络安全方面的理论知识,有兴许的朋友可以-This file for my network security aspects of the theory of knowledge, there is perhaps a friend can look at the
Petrinet
- 电子支付安全协议的Petri网模型及分析-Electronic payment security protocols and analysis of Petri net model
113
- 无线网络信息理论安全研究,是研究信息理论安全课题的经典资料-Wireless Information-Theoretic Security.pdf
3
- 基于椭圆曲线离散对数问题的一次签名方案。出了一个基于椭圆曲线离散对数问题的可证安全性的一次签名方案,构造了一个椭圆曲线群上的单向 函数,给出了签名方案初始化的相关算法以及椭圆曲线群上的点加算法和倍点算法,设计了签名算法和验证算法,同时证明了签名方案的安全性.-Based on elliptic curve discrete logarithm problem in a signature scheme. Out of one based on elliptic curve discrete
Bosch
- 属于安防工程之类的参考资料.毕竟有需要的人.Bosch防盗探测器参考指南-Security engineering is the reference category. After all, people in need. Bosch anti-theft detectors Reference Guide
anquanzhoubao
- 安全周报 一本介绍最新安全技术和动态的杂志-Security Weekly 1 on the latest security technology and dynamic magazine
AT88SC25616C
- The AT88SC25616C member of the CryptoMemory® family is a high-performance secure memory providing 256 Kbits of user memory with advanced security and cryptographic features built in.-AT88SC25616C
DBSecurity-Overview
- Security in Database tutorial-Security in Database tutorial...
010
- 浙等保[2007]3号 关于印发《浙江省信息安全等级保护 工作实施方案》的通知 -Delta, Paul [2007] No. 3 on the issuance of " security level of information protection in Zhejiang Province to implement the program," the notice
8.1-Lesson-26
- ROUTING TECHNIQUES Routing requires a router to have a routing table. Several techniques are employed to make the size of the routing table manageable and handle issues such as security. Some of these techniques are discussed here.
get1PDF
- IEEE papers based on wimax security
get2PDF
- IEEE 802.16 Security + IEEE papers
Security-Paper-Presentation
- A Novel Security Scheme for Wireless Adhoc Network
Cloud-Security-with-Virtualized-Defense
- Cloud Security with Virtualized Defense
Cloud-Security-Issues
- Cloud Security Issues
INFORMATIC-SECURITY
- INFORMATIC SECURITY : DIAPORAMA