利用java实现文件的AES加密功能 This Java AES Crypt package contains the Java class es.vocali.util.AESCrypt, which provides file encryption and decryption using aescrypt file format. Requirements The Java AES Crypt package only works in Java 6, but can be easily adapted to Java 5 by replacing the call to NetworkInterface.getHardwareAddress() with something else. In order to use 256 bit AES keys, you must download and install "Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files" from http://java.sun.com/javase/downloads/index.jsp
标签: Java AES AESCrypt contains
上传时间: 2017-02-11
上传用户:kiklkook
This file contains board-specific information for the Motorola cpv3060 target board. Specifically, this file contains information on any BSP interface changes from previous software or hardware versions, and contains caveats that the user must be aware of before using this BSP. Additionally, the target board s reference entry (i.e., cpv3060/target.nr) provides board-specific information necessary to run VxWorks, and should be read before this BSP is used.
标签: board-specific Specifically information Motorola
上传时间: 2017-02-16
上传用户:libinxny
This file contains board-specific information for the Motorola LoPEC in support of the lopec BSP. Specifically, this file contains information on any BSP interface changes from previous software or hardware versions, and contains caveats that the user must be aware of before using this BSP. Additionally, the target board s manual page entry (for example, lopec/target.nr) provides board-specific information necessary to run VxWorks, and should be read before this BSP is used.
标签: board-specific information the Motorola
上传时间: 2013-12-05
上传用户:a673761058
Instead of finding the longest common subsequence, let us try to determine the length of the LCS. Then tracking back to find the LCS. Consider a1a2…am and b1b2…bn. Case 1: am=bn. The LCS must contain am, we have to find the LCS of a1a2…am-1 and b1b2…bn-1. Case 2: am≠bn. Wehave to find the LCS of a1a2…am-1 and b1b2…bn, and a1a2…am and b b b b1b2…bn-1 Let A = a1 a2 … am and B = b1 b2 … bn Let Li j denote the length of the longest i,g g common subsequence of a1 a2 … ai and b1 b2 … bj. Li,j = Li-1,j-1 + 1 if ai=bj max{ L L } a≠b i-1,j, i,j-1 if ai≠j L0,0 = L0,j = Li,0 = 0 for 1≤i≤m, 1≤j≤n.
标签: the subsequence determine Instead
上传时间: 2013-12-17
上传用户:evil
The CSS Cookbook cuts straight through the theory to provide hundreds of useful examples and CSS code recipes you can use immediately to format your web pages. Reflecting CSS2 and including topics that range from basic web typography and page layout to techniques for formatting lists, forms, and tables, the CSS Cookbook is a must-have resource for any web author who has even considered using CSS.
标签: CSS Cookbook straight hundreds
上传时间: 2013-12-21
上传用户:sjyy1001
.NET Remoting is very important in distributed environments. This book essentially deals with the core concepts of .NET remoting along with some working examples. A must read.
标签: environments distributed essentially important
上传时间: 2014-01-18
上传用户:familiarsmile
Shortest Paths with Multiplicative Cost. In a given undirected graph, the path cost is measured as a product of all the edges in the path. The weights are rational numbers (e.g., 0.25, 0.75, 3.75 etc) or integers (2, 3). There are no negative edges. Given such a graph as input, you are to output the shortest path between any two given vertices. Input is the adjacency matrix and the two vertices. You must output the path.
标签: Multiplicative undirected Shortest measured
上传时间: 2017-04-08
上传用户:邶刖
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
标签: perceptual implementation algorithms fingerpr
上传时间: 2013-12-08
上传用户:星仔
The Fat Fs module is a middleware that written in ANSI C. There is no platform dependence, so long as the compiler is in compliance with ANSI C. However it handles the system portable FAT structures. You must take the endian into consideration. It must be changed for your platform first or the compiler will abort with an error.
标签: C. dependence middleware platform
上传时间: 2014-01-12
上传用户:cccole0605
This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND. Author(s): Ole Saether DESCRIPTION: This example should be used together with ex2a-tx433.asm. One nRF9E5 evaluation board (receiver) should be programmed with the hex-file generated from assembling this file and the other evaluation board (transmitter) programmed with the hex-file generated from assembling ex2a-tx433.asm. All switches on the DIP-swith S206 on the receiver must be set to the "on" position and all switches on the DIP-swith S205 on the transmitter must be set to the "on" position. When one of the switched SW1-SW4 on the transmitter is pressed the corresponding LED on the receiver is turned on. The functionality is the same as in ex2c-rx.c.
标签: distributed WARRANTY WITHOUT useful
上传时间: 2017-05-17
上传用户:xieguodong1234