资源列表
SecuritySystem
- files encription in Java
LinuxC
- 基于BT协议的文件分发系统由以下几个实体构成。 (1)一个Web服务器。 (2)一个种子文件。 (3)一个Tracker服务器。 (4)一个原始文件提供者。 (5)一个网络浏览器。 (6)一个或多个下载者。 -BT based on a document of agreement by the following entities. (1) a Web server. (2) a seed file. (3) a Tracker Server. (4), a prov
CODE
- QQ加密算法的分析,包含数据结构的详细分析-failed to translate
JavaAesTester
- 128 bits key length possible to send cyphertext via network store/load key executable file(*.exe) included
Exercise-1-Cholesky-Decomp
- exercise choleskey for fwd and backword substitution. check for possitive syymmetric and definite condition
z_socket
- linux 下udp和tcp的客户端和服务器的程序,分类.-linux udp tcp client server
misc-modules
- 几个常用的linux内核驱动程序编写例子,适宜初学linux驱动者.-linux driver
Cryptography_for_Developers-SimonJohnson.pdf
- A very good reference for people interested in applied cryptography.
Applied_Cryptography3540222170
- Very good book on cryptography.
Nachos-scheduler.tar
- 本课题的目的是要实现缺页处理程序,这需要在适当的时候将某些页面替换出/入。为了减少缺页和将页面从内存淘汰到磁盘的次数,要求你实现五种页面替换算法。 NRU(Not Recently Used)算法 SC(Second Chance)算法 Clock算法 Working Set算法 Aging算法 -The purpose of this project is to achieve the missing page handling procedures, which ne
charactersanalysissecurity
- 说到字符,很多用户也许会不以为然:小小的字符,不过是个非常基础的人机交互表达形式,它能产生什么威胁?但是,威胁偏偏就来自 最原始的方面,并且这种威胁往往是最危险的,也是最难以防范的。-Speaking of characters, many users may not: a small character, but is a human-computer interaction based on the expression of the form of what the threat of
traversinggraph
- traversinggraph,Through this program of graph traversal function
