首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6篇
  免费   0篇
教育   6篇
  2007年   1篇
  2006年   1篇
  2005年   2篇
  2003年   2篇
排序方式: 共有6条查询结果,搜索用时 171 毫秒
1
1.
"计算机组成与设计"课程教学创新改革   总被引:4,自引:2,他引:4  
文章通过介绍"计算机组成与设计"课程的教学改革,阐述了在创新教育和素质教育中,计算机科学与技术教育改革的一条途径。教学中提出了面向设计并着重掌握设计方法的观点;实验中提出了按不同要求分层次的观点和综合设计、创新设计的观点。让学生在上课中得到提高、在实验中得到锻炼,逐步把学生培养成具有创新意识、动手能力强的高素质人才。  相似文献   
2.
The C programming language is expressive and flexible, but not safe; as its expressive power and flexibility are obtained through unsafe language features, and improper use of these features can lead to program bugs whose causes are hard to identify. Since C is widely used, and it is impractical to rewrite all existing C programs in safe languages, so ways must be found to make C programs safe. This paper deals with the unsafe features of C and presents a survey on existing solutions to m…  相似文献   
3.
Distributed certification via threshold cryptography is much more secure than other ways to protect certification authority (CA)'s private key, and can tolerate some intrusions. As the original system such as ITTC, etc., is unsafe, inefficient and impracitcal in actual network environment, this paper brings up a new distributed certification scheme, which although it generates key shares concentratively, it updates key shares distributedly, and so, avoids single-point failure like ITTC. It not only enhances robustness with Feldman verification and SSL protocol, but can also change the threshold (t, k) flexibly and robustly, and so, is much more practical. In this work, the authors implement the prototype system of the new scheme and test and analyze its performance. Project supported by the Nature Science Foundation of China (No. 79974031) and Zhejiang Nature Science Foundation (No. 600014)  相似文献   
4.
Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space se…  相似文献   
5.
INTRODUCTION The development of network technology led to the appearance of many high-speed networks with bandwidth larger than 1 Gbps, or even 10 Gbps. Through high-speed networks, applications like sci- entific collaboration, telemedicine, and real-time environment monitoring can transfer high-bandwidth real time data, images, and video captured from re- mote sensors such as satellite, radars, and echocar- diography. What is more, data intensive grid applica- tion (Foster et al., 2001)…  相似文献   
6.
INTRODUCTIONItiswell knownthatcertificationauthority(CA)isthecorecomponentofpubliccrypto graphicinfrastructure (PKI) ;andthatthesecu rityofitsprivatekeyisveryvital.Iftheprivatekeyiscompromised ,thewholePKIwillbecor rupted .Generally,therearetwotypesofCA :…  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号