当前位置:
首页
资源下载

搜索资源 - Security in Computing
搜索资源列表
-
0下载:
问题的提出:金卡在现代生活里应用广泛,无论排长队于ATM机前取款还是就餐、购物、就医等等。在国外电子货币十分流行,其实电子货币是系统工程,它涉及金融、安全、通信、计算机等领域。这里为使读者掌握动态数据的用法,仅模拟其存款于取款过程。-The question raised: Gold in the modern life are widely used, regardless of long lines at teller or ATM machine before dining, shoppi
-
-
0下载:
Radio Frequency Identification [RFID]
systems have become popular for
automated identification and supply chain
applications. This article describes the
technical fundamentals of RFID systems
and the associated standards. Specifically,
we
-
-
1下载:
GlobalPlatform Security Access Module】Applet(以下簡稱GPSAM)提供在GlobalPlatform Card上的Card Manager Key驗證、更新與APDU Command的MAC計算之功能。利用JavaCard本身的DES運算與基碼儲存功能,所有基碼多樣化或驗證運算過程皆在卡片內部完成,確保基碼只進不出之安控要求。-GlobalPlatform Security Access Module】 Applet (hereinafter refe
-
-
0下载:
数字图像处理领域中的一些应用实例,以理论和实践相结合的方式,系统地介绍了如何使用C#进行数字图像处理。
全书共11章,分别讲述了图像的点运算、几何运算、数学形态学图像处理方法、频率变换、图像平滑与去噪、边缘检测、图像分割、图像压缩编码和彩色图像处理等相关技术。-Digital image processing in the field of some application examples to the theory and practice, a combination of syst
-
-
0下载:
Security in computing的最新版,对学习data security的人很有帮助-The latest version of Security in computing, very helpful to the study of data security
-
-
0下载:
The sensor networks application domain continues to increase with the need for an
effective security mechanism. The fact that WSN often deal with sensitive data operating in
hostile and unexpected environments, makes the concept of security consi
-
-
0下载:
Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and is
gradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with each
othe
-
-
0下载:
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application sof
-
-
0下载:
semiars
The World Wide Web, which has started as a document
repository, is rapidly transforming to a full fledged virtual
environment that facilitates services, interaction, and com-
munication. Under this light, the Semantic Web and Web
2.
-
-
0下载:
Describes Cloud computing and its needs.
-
-
0下载:
Data security in cloud computing
-
-
0下载:
Data security in cloud computing....how to achieve...abstract document-Data security in cloud computing....how to achieve...abstract document..
-
-
0下载:
CLOUD COMPUTING
Towards Self-manageable Cloud Services
Cloud computing represents a promising computing paradigm, where computational power is provided as a utility. An important characteristic of Cloud computing, other than in similar paradigms
-
-
0下载:
:本文介绍了云计算应用的基本概况及云计算发展遇到的关键问题,基于Internet的云计算数据访问安全是云计算安全的中心。本文设计了基于MD5、SM2及SSF33算法和身份认证的PKI安全访问体系架构,基于此安全访问架构下的公开信道的数据访问安全得到了保证。-: This paper describes the application of cloud computing and cloud computing basic overview of the key issues encountere
-
-
0下载:
Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and isgradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with eachother in a
-
-
0下载:
云计算安全研究 云计算是当前信息技术领域的热门话题之一,是产业界、学术界、政府等各界均十分关注的焦点-Cloud Computing Cloud computing security research is currently one of the hottest topics in the field of information technology is the focus of public industry, academia, and government are very conc
-
-
0下载:
分析了云计算对信息安全领域中技术、标准、监管等各方面带来的挑战 提出云计算安全参考框架及该框架下的主要研究内容。-Analyzes the challenges of cloud computing in all aspects of information security technologies, standards, regulatory brought proposed cloud security reference framework and main contents unde
-
-
0下载:
Define cloud and its characteristics firstly , and then give cloud
computing architecture in detail , lastly introduce the security issues of cloud computing and give corresponding security mechanism against
these security issues.-Define cloud an
-
-
0下载:
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application sof
-
-
0下载:
Data Security in the World of Cloud Computing-Data Security in the World of Cloud Computing
-