搜索结果
找到约 601 项符合
private-key 的查询结果
数据结构 /* * The internal form of a hash table. * * The table is an array indexed by the hash of the k
/*
* The internal form of a hash table.
*
* The table is an array indexed by the hash of the key collisions
* are resolved by hanging a linked list of hash entries off each
* element of the array. Although this is a really simple design it
* isn t too bad given that pools have a low allocation ...
J2ME java的一个源代码
java的一个源代码,、
public class ThunderBoltAct extends Canvas implements Runnable {
private int TIMEOUT = 0
private final static int NUMERIC = 10000 //总分
private final static int INERRGAL = 60 //频率
private final static int MAXBATTLE = 3 //最大飞机数
private final static int MAXBALLNUM = ...
VHDL/FPGA/Verilog Infrared telecontrol design based on the the VHDL includes the mode of infrared send,receive mode,ke
Infrared telecontrol design based on the the VHDL includes the mode of infrared send,receive mode,key code mode,ringing mode and so on.
Symbian flash lite开发 ArcadeHeroes.swf SWF content games/invaders.swf SWF content games/pacman.swf SWF
flash lite开发
ArcadeHeroes.swf SWF content
games/invaders.swf SWF content
games/pacman.swf SWF content
Arcade1_2nd_edition.SIS Nokia S60 2nd Edition SIS package
Arcade1_3rd_edition_signed.sis Nokia S60 3rd Edition signed SIS package
Arcade1_2nd_edition.pkg Nokia S60 2nd Edition SIS Package de ...
数据结构 扫描一个C源程序
扫描一个C源程序,用Hash表存储该程序中出现的关键字,并统计该程序中的关键字出现频度。用线性探测法解决Hash冲突。设Hash函数为:
Hash(key)=[(key的第一个字母序号)*100+(key的最后一个字母序号)] MOD 41
Linux/Unix编程 在Linux下访问LDAP目录
在Linux下访问LDAP目录,验证客户端用USB KEY签名的文件。
网络 LPC21XX系列开发板测试原代码,包括FLASH电源管理MODEMKEY等驱动程序
LPC21XX系列开发板测试原代码,包括FLASH\电源管理\MODEM\KEY等驱动程序
加密解密 This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message au
This standard describes a keyed-hash message authentication code (HMAC), a
mechanism for message authentication using cryptographic hash functions. HMAC can
be used with any iterative Approved cryptographic hash function, in combination with a
shared secret key. The cryptographic strength of HMAC de ...
加密解密 Tasks Read the textbook about the details of Vigenére Cipher. Implement the algorithm by C or C++.
Tasks
Read the textbook about the details of Vigenére Cipher.
Implement the algorithm by C or C++.
Requirements
You do this lab in a group of two students.
Your program should have input and output as follows:
csci>a.out
--> Please input the key:
receptive
--> Please input the plain text:
wearedis ...