- Strength to Increase Rep
- +0
- Strength to Decrease Rep
- -0
- Upvotes Received
- 1
- Posts with Upvotes
- 1
- Upvoting Members
- 1
- Downvotes Received
- 0
- Posts with Downvotes
- 0
- Downvoting Members
- 0
4 Posted Topics
Hi, Network Sec occurs at all TCP/IP layers ie Physical layer security will deal with cable shielding, quantum cryptography, burglar proofing,CCTV, Proxy card and Biometric door access control systems, all in the name of protecting the physical network infrasructure. The Data link and MAC layers will deal with security at …
Hello, i have a different view of the problem you are solving. If it be that you are looking at a financial computation of the sort as how much money would have accumulated over a period, given monthly deposits of 100 dollars at a given annual interest rate i which …
Hi, could you please provide some more info on that, eg code snippets. Thanks [QUOTE=schrd;1120756]hello,I am doing project on key management scheme for secure broadcasting in Java.It needs hierarchy of classes similar to e-subscription of newspaper and pay-tv systems.I've done it using three classes like 1.Read,write and download 2. Read …
Hi folks, i need some help on how to get this code to work properly: I have not had the time to fully commit to its intrinsics but i am sure there is someone in the community who can get me some quick help. Thanx.[code]package javaapplication1; import java.io.ByteArrayOutputStream; import javax.crypto.Cipher; …
The End.
kawalya