• Chapter 7: Advanced Encryption Standard (AES)

    Chapter 7: Advanced Encryption Standard (AES)

    Objectives of Chapter 7: To review a short history of AES; to define the basic structure of AES; to define the transformations used by AES; to define the key expansion process; to discuss different implementations.

     11 p vlute 16/11/2015 315 1

  • Chapter 13: Digital Signature

    Chapter 13: Digital Signature

    Objectives of Chapter 13: To define a digital signature; to define security services provided by a digital signature; to define attacks on digital signatures; to discuss some digital signature schemes, including RSA, ElGamal, Schnorr, DSS, and elliptic curve; to describe some applications of digital signatures.

     8 p vlute 16/11/2015 399 1

  • Chapter 14: Entity Authentication

    Chapter 14: Entity Authentication

    Objectives of Chapter 14: To distinguish between message authentication and entity authentication; to define witnesses used for identification; to discuss some methods of entity authentication using a password; to introduce some challenge-response protocols for entity authentication; to introduce some zero-knowledge protocols for entity authentication; to define biometrics and distinguish between physiological and behavioral techniques.

     7 p vlute 16/11/2015 465 1

  • Chapter 12: Cryptographic Hash Functions

    Chapter 12: Cryptographic Hash Functions

    Objectives of Chapter 12: To introduce general ideas behind cryptographic hash functions; to discuss the Merkle-Damgard scheme as the basis for iterated hash functions; to distinguish between two categories of hash functions; to discuss the structure of SHA-512; to discuss the structure of Whirlpool.

     8 p vlute 16/11/2015 378 1

  • Chapter 15: Key Management

    Chapter 15: Key Management

    Objectives of Chapter 15: To explain the need for a key-distribution center; to show how a KDC can create a session key; to show how two parties can use a symmetric-key agreement protocol to create a session key; to describe Kerberos as a KDC and an authentication protocol; to explain the need for certification authorities for public keys; to introduce the idea of a Public-Key Infrastructure (PKI) and explain some of its duties.

     7 p vlute 16/11/2015 439 1

  • Evaluation of Dynamic Bandwidth Allocation Algorithms in GPON Networks

    Evaluation of Dynamic Bandwidth Allocation Algorithms in GPON Networks

    In this paper, two approaches for Dynamic Bandwidth Allocation in GPON networks are proposed, andvalidated through simulations in the OPNET modeler. One approach address a Status Reporting scheme, where the bandwidth allocation originates from the client request. The second use a centralized Non Status Reporting scheme. Mời các bạn cùng tìm hiểu và tham khảo tài liệu.

     10 p vlute 16/11/2015 331 1

  • Dynamic Assignment Protocols for Multiwavelength Gigabit-PONs

    Dynamic Assignment Protocols for Multiwavelength Gigabit-PONs

    Dynamic Assignment Protocols for Multiwavelength Gigabit-PONs sẽ giới thiệu tới các bạn một số vấn đề chính: Introduction, passive Optical Networks (PON) , GPON Enhancement for MultiWavelength Operation, Multi-Wavelength Network Simulation Model,... Hy vọng tài liệu sẽ hỗ trợ các bạn trong quá trình học tập và nghiên cứu của mình.

     196 p vlute 16/11/2015 211 1

  • Simulation of Active Admission Control Algorithms with OPNET

    Simulation of Active Admission Control Algorithms with OPNET

    Simulation of Active Admission Control Algorithms with OPNET với các vấn đề chính được trình bày như sau: Introduction, Integration of Multicast Routing and Active Admission Control, Comparison of Analytical Approach and OPNET Simulation,... Hy vọng tài liệu là nguồn thông tin hữu ích cho quá trình học tập và nghiên cứu của các bạn, Mời cùng tham khảo.

     11 p vlute 16/11/2015 541 1

  • Fitting

    Fitting

    Invite you to consult the lecture content "Fitting" below. Contents of lectures introduce to you the content ''Problem with vertical least squares, total least squares, least squares as likelihood maximization, least squares for general curves". Hopefully document content to meet the needs of learning, work effectively.

     34 p vlute 16/11/2015 309 1

  • Face detection

    Face detection

    To help you specialized culture and art have added references in the process of learning and study. Invite you to consult the lecture content "Face detection". Each of your content and references for additional lectures will serve the needs of learning and research.

     39 p vlute 16/11/2015 349 1

  • Ebook Computer vision algorithms and applications

    Ebook Computer vision algorithms and applications

    Image formation, feature detection and matching, segmentation, feature-based alignment, structure from motion is the main content of the book "Computer vision algorithms and applications". Invite you to consult the detailed content lectures to capture details.

     833 p vlute 16/11/2015 431 1

  • Comp 776: Computer vision

    Comp 776: Computer vision

    What kind of information can we extract from an image, why study computer vision, why is computer vision difficult,... To help you answer the questions above, you are invited to refer to the content of the curriculum ''Comp 776: Computer vision". Hope this is useful references for you.

     61 p vlute 16/11/2015 449 1

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=vlute