搜索资源列表
tiaoxingmakaifa
- 摘要:采用Foxpro2.5T3数据库开发平台开发了一种计算机机房和网吧收费管理系统,该系 统的帐户信h,基」几条形码识别身份,也可以直接键入用户帐户的数码,所需的用户信h,完全山 计算机集中管理。该系统是一种重l从对上机计费、值班人员工作日志与收费情况进行详细记 录,J{含有信任委托技术在内的机房网吧管理收费系统,系统成木低廉、运行速度快、代码紧 凑、功能健全、开发平台简单。 -Abstract : using Foxpro2.5T3 database developmen
可信网络连接关键技术研究与实现
- With the accelerate implementation of information and the rapid development of e-commerce and e-government, the network security is of great significance. Now people are more concerned about how to ensure working at a trusted network environment. In
upgradeWinXPperatingspeed
- 在使用XP的过过程中,系统运行速度会随着时间的推移越来越慢了,有的朋友可能会想到重装系统,但重装后,那么多的应用软件也要重新安装,如何在不安装系统的前提下提升XP的运行速度呢?只要你安照以下九个方面操作,相信你的XP又会重新高速运行。 -In the use of XP over the process, the system operating speed will over time become increasingly slow, and some people may think
12864
- 自己在lm3s1138上面移植的128*64程序,也有51的程序,还有128*64的中文说明书,相信会对大家有用的。-Their transplants at lm3s1138 above 128* 64 procedures, 51 there is also the procedures, 128* 64 have English instructions, the trust will be useful to everyone.
PKITS.pdf
- A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on
NIST_Recommendation_for_X509_PVMs.pdf
- A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or
AGENT_TRUST
- It is a document which is very new today, It discribe recommender System that use trust technique in Recommender System!
sensors-09-03958
- We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad re
6
- The use of computers in public places i ncreasingly common in everyday life. In using one of these computers, a user is trusting it to correctly carry out her orders. For many transactions, particularly banking operations, blind trust in a publ
1
- A Reputation Mechanism Based on Collaborative Automated Trust Negotiation in P2P System.pdf
MP_Tool_User_Guide
- ocated in Brampton Ontario, Space Aid Manufacturing is an undisputed leader in the warehouse storage system, material storage product and metal stamping industries. Our I3 approach to business (Independence, Integrity and Innovation) is integral to o
darkfire
- I m releasing my private ring3 rootkit "DarkFire" now. It s written in C#, source is included. Also there are the 4 examples, but you may also execute the source from VS if you don t trust exes... Features: * Hide Processes * Hide Regis
eigentrust
- 这是一篇研究P2P信任管理的经典文章,全局信任模型EigenTrust。-This is one of the classic articles P2P Trust Management, the global trust model EigenTrust.
An_Improveme_of_LEACH_Routing_Protocol_Based_on_T
- Abstract—LEACH is a hierarchy routing protocol for WSN (wireless sensor networks), which is superior to direct communication protocol, minimum-transmission-energy protocol and static clustering protocol. owever, LEACH itself has some defects. In this
Ethical-Analysis
- I. Find the facts A. List the relevant facts • Mitron o Free support and training: reduce business income make more workload of their staffs. o Freeze all salaries for 18 months: affect staff’s ambition and expect staff maybe move to an
ex06b
- I won t try to contrive a business-oriented example that uses all the custom controls. I ll just slap the controls in a modal dialog and trust that you ll see what s going on. The steps are shown below. After step 3, the instructions are oriented to
A-Taxonomy-and-Adversarial-Model-for
- In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have been put forth to sanitize this sensitive data source in order to
solarsystemrefrence
- SOLAR CELL SIMULINK FUSECCTION TO HELP YOU VERY EASY TO USE AND SIMPLE FUNCTION, ALSO HAVE DIALOG BOX.YOU WILL BE LOVE IT. TRUST ME-SOLAR CELL SIMULINK FUSECCTION TO HELP YOU VERY EASY TO USE AND SIMPLE FUNCTION, ALSO HAVE DIALOG BOX.YOU WILL BE LOVE
CACLMDZK
- 《可信计算平台信任链的可信赖性度量指标与方法》国家质量技术监督局 发布-"Chain of trust trusted computing platform, the trustworthiness of the metrics and methods" of Quality and Technical Supervision issued
China-Trust-Industry
- 中国信托业发展报告(2012),最全的行业分析-China Trust Industry Development Report (2012)