搜索资源列表
AuthorWeb(.net)
- 用c#开发的B/S模式的图书在线出版系统DB事sql server,为三层模式,用户层,业务逻辑层,DB层,详细说明见附录-with the development of B / S mode of books online publishing system DB things sql server, for the three-tier model, the user layer, business logic tier, DB layer details, see appendix
guider
- 导游系统的C++实现-This is a guider s system which is ralized in c
code
- 应用密码学这本书的源代码,很难找,用C编写的,很好懂-Applied Cryptography This book s source code, it is difficult to find, using C prepared, well understood
DVB-CSA_descrambling_for_ts
- 支持DVB-S,DVB-T,DVB-C的系统前端加扰和解扰过程,请注意加扰与加密不同,本程序包实现的是纯粹的加扰和解扰过程,不对KEY进行加密传输。要求输入测试文件时,请按照C语言的文件访问要求输入,如key.txt表示你要使用的KEY放在了名为key的txt文件中,不可写成“key.txt”。-To support the DVB-S, DVB-T, DVB-C system front-end process of scrambling and descrambling, please no
code
- C# (pronounced "C Sharp") is a multi-paradigm programming language encompassing imperative, functional, generic, object-oriented (class-based), and component-oriented programming disciplines. It was developed by Microsoft within the .NET initiative a
code245
- C# (pronounced "C Sharp") is a multi-paradigm programming language encompassing imperative, functional, generic, object-oriented (class-based), and component-oriented programming disciplines. It was developed by Microsoft within the .NET initiative a
secure_comunication_software
- 一个基于openssl开发的安全通信软件,可实现消息发送方和接收方之间的安全通信,编程语言为C语言。-It s a openssl-based development of secure communications software that enables the message sender and receiver of secure communication ,programming languages is C language.
Ceasar
- This the Caesar s cipher implemented in C-This is the Caesar s cipher implemented in C
`
- 应用程序的用户验证程序,C语言编写,简单验证用户.-Application' s user authentication procedures, C language, simple to authenticate the user.
prob3
- Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod N) Write three functions to
q1
- Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digital signature. A verifies