搜索资源列表
kt
- 实现骑士游历问题。 骑士游历问题是一个经典的数学问题。其思想在电路图的设计及图像加密等方面都有帮助,如果能将骑士游历问题算法通过计算机语言程序化将对其在其他领域中的应用有极大帮助。通过研究骑士游历的规则对问题进行数学模型抽象,通过研究骑士游历的方向与可到达情况,将骑士的空间移动抽象成数学表达式,进而映射到程序中所需对应的数据结构形式,最后通过利用JAVA语言得以实现骑士游历问题中骑士游历过程的动态图形演示。 -Knight traveled to achieve the problem. Kni
java_security_sdk
- 软件是bouncycastle组织开发的软件包,包括DES_CBC算法的实现、RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证)、数字信封的实现、利用数字信封实现大文件的加密、解密。可以作为研究、学习信息安全中的密码学设计与实现技术。在原版的基础上进行一些改进,对文件加密、解密的时候要频繁的IO加一个缓冲区,RSA私钥积存的时候可以按PKCS8形式,再经BASE64编码保存。-Software development organization is bouncycastl
encode
- 用java实现的简单的异或加密算法,有界面支持,可以设置加密字符串!-With the java implementation of a simple XOR encryption algorithm, interface support, you can set the encryption string!
crypto
- 3DES(即Triple DES)是DES向AES过渡的加密算法,它使用3条64位的密钥对数据进行三次加密-3DES (that is Triple DES) DES is a transition to the AES encryption algorithm, which uses three 64-bit key encrypting data three times
Base64
- a good java util for base64 encode decode
OReilly---Java-Programming-On-Linux
- This book is neither a course in Java programming nor a manual for the Linux OS. While the well-written text provides overviews of both Java and Linux, it s really a compendium of information you ll want on hand once you ve chosen Java-on-Linux
Inside-the-Java-Virtual-Machine--1997
- This book describes the Java Virtual Machine, the abstract computer on which all Java programs run. Through a combination of tutorial explanations, working examples, reference material, and applets that interactively illustrate the concepts presented
nachos-java.tar
- nachos,用于教学的操作系统,java语言编写-nachos , a operating system used particularly for teaching.
Method-collection-of-Java-encryption
- 描述了多种常用加密算法的java代码,其中包括:des,3des,aes,rsa,dsa,md5,sha1.的具体实现。-Describes a variety of commonly used encryption algorithm java code, including: des, 3des, aes, rsa, dsa, md5, the sha1.
RSA
- 用java实现的加解密和数字签名功能的源代码,可以作为毕业设计和学习用-Encryption and decryption and digital signature capabilities with java source code, can be used as a graduation project and learning
a
- java环境下的把一个字符串 MD5加密-a method for String to MD5 String
Beginning-Cryptography-with-Java-0764596330
- A book about encrytion in Java
Tetris-game-java
- 这是一个用java实现的俄罗斯方块,方向键控制移动方块方向,向上键旋转方块,p键暂停,空格键瞬间下落,enter键开关方块下落时的竖条阴影,q键为作弊键。 此小的游戏程序运用了java的jdbc 反射 mvc框架 xml配置文件 swing 线程等知识点-This is a java Tetris, the arrow keys to move the box to control the direction of rotation up key box, p key to pause
java-Demo
- 这是一个简单的java DEMO,对于初入职场的同学们,可以做为上手的一个入口。-This is a simple java DEMO, for students entering the workplace, can be used as an entrance to get started.
a
- 自用的一个加密解密库,java与C层已经互通,方便调试-A cryptographic library for their own use, java and C layers have been interoperability, facilitate debugging
Aspose.Cells.Java.Demos
- aspose.cells的一个项目,里面包含了对excel文件的一个操作,很好用的一个组件,推荐使用-aspose.cells of a project , which contains an excel file operation , a component of the good, recommended
A
- (1)编写一个Java应用程序 定义一个类,包含两个成员变量x和y,其中x为类变量,y为实例变量。 1)分别在类中定义获取和设置x与y的方法;( 2)创建一个测试类,在其主函数中构建第一个类的2个对象,分别通过第一个类中的设置方法,为2个对象的x和y赋值,最后输出2个对象的x和y变量值。 -(1) write a Java application Define a class that contains two member variables x and y, where
Java-binary-tree
- 用Java编写的二叉树的数据结构,包括二叉树的每个节点的值,以及各子树的指针。 -Written in Java binary tree data structure, including the value of each node of a binary tree, and each sub-tree pointer.
Yush.java.tar
- This a new algorithm in which we encrypt on the basis of position of the character. Algorithm 1 for key generation and Algorithm 2 is for encryption Algorithm A1 Step1: Let the key be ‘k’. Step2: Multiply the index number +1 with its ASCII c
crypto rsa
- A user of RSA creates and then publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, an