Quantcast
Channel: IT Research Paper » data encryption
Browsing latest articles
Browse All 10 View Live

Design and Realization of End-to-End Security Solutions Based on J2ME

With the highly integration of internet and mobile communication technologies, the m-commerce has emerged. Because of the limitations of wireless channels and mobile terminal equipments, the problem of...

View Article



Design and Realization of End-to-End Security Solutions Based on J2ME

With the highly integration of internet and mobile communication technologies, the m-commerce has emerged. Because of the limitations of wireless channels and mobile terminal equipments, the problem of...

View Article

The Design of Big File Safety Transmission System under the Public Network...

With the rapidly development of computer technology, software system in the application of computer field becomes more and more widely. In the file transfer system, especially in large file transfer...

View Article

AES Algorithm Optimization and Application in Electronic Systems

The information and networking of modern society is not only providing greatconvenient and efficient to human life, but also bringing huge challenge to informationsecurity, and modern electronic...

View Article

Research and Design of Remote Identity Authentication Systme on Cancelable...

With the rapid development of computer network and information technology, the era of the global information network and information security also shows the unprecedented importance, remote user...

View Article


The Design and Achievement of General Intelligent Application Platform in...

Manufacturing industry is the economic lifeline of the country, and the development of the manufacturing industry at the same time also reflects a country’s comprehensive economic strength, so how to...

View Article

Design and Implementation of JavaEE-based Management Information System for...

To promote the training of tax cadres scientificly, systematicly, standardized, it is related to the development of a tax base, strategic projects that train high quality taxing a contingent of cadres....

View Article

The Research and Application Based on Elliptic Curve Cryptosystems

With the rapid development of computers network, people more focus on the security of the information in networks. The research and application of cryptology is one of the core domains of the...

View Article


Research on the Key Technologies of Remote Monitoring for PLC

With the rapid development of economic, the scale of industrial production becomes larger and larger. The environment of industrial zone is poor. PLC is used in industrial zone as the core of...

View Article


Based on TCP/IP Application Layer Design and Implementation of Security Protocol

With the rapid development of global information technology, information networks have been applied to all walks of life, Such as: military, political, technological, commercial, financial, etc. It has...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images