点击切换搜索课件文库搜索结果(2601)
文档格式:DOC 文档大小:124KB 文档页数:22
个案调查法是指采用各种方法,搜集有效、完整的资料,对单一对象进行深入细致研究的方法。个案调查法不仅仅只是一种研究方法,也是一门复杂的认知课程,是帮助个人解决现实问题的理论。通常个案调查法是在对象总体中选择特定的人、事、物所进行的深入描述和分析,研究对象可以是一个人、一个机构、一个社会团体等。 第一节 什么是个案调查法 第二节 怎样进行个案调查 第三节 个案调查要注意什么
文档格式:PPT 文档大小:411KB 文档页数:82
Additional key-sizes and block-sizes Ability to function efficiently and securely in a wide variety of platforms and applications low-end smartcards, wireless: small memory requirements IPSec, ATM – small key setup time in hardware B-ISDN, satellite communication – large encryption speed Flexibility
文档格式:PPT 文档大小:405KB 文档页数:63
Iterating Block ciphers Definition A product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the individual components. Definition An iterated block cipher is a block cipher involving the sequential repetition of an internal function called a round function. Parameters include the number of rounds Nr, the block bitsize n, and the bitsize k of the input key K from which Nr subkeys Ki (round keys) are derived. For invertibility (allowing unique decryption), for each value Ki the round function is a bijection on the round input
文档格式:PPT 文档大小:159.5KB 文档页数:56
Definitions – Digital Signature - a data string which associates a message with some originating entity – Digital Signature Generation Algorithm – a method for producing a digital signature – Digital signature verification algorithm - a method for verifying that a digital signature is authentic (i.e., was indeed created by the specified entity)
文档格式:PPT 文档大小:51KB 文档页数:22
Numbers Integers Real Arithmetic Operations Addition and subtraction Multiplication and division Exponentiation and logarithm
文档格式:PPT 文档大小:278KB 文档页数:56
Security Attack: Any action that compromises the security of information. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms
文档格式:PPT 文档大小:1.92MB 文档页数:68
Public-Key Applications can classify uses into 3 categories: – encryption/decryption (provide secrecy) – digital signatures (provide authentication) – key exchange (of session keys)
文档格式:PPT 文档大小:279KB 文档页数:35
You are the CEO of Coca-Cola. You are responsible for bringing a refreshing taste to zillions of people all over the world, but want to keep the recipe secret from Pepsi’s industrial spies
文档格式:PPT 文档大小:3.54MB 文档页数:181
5.1 认识Authorware 6.0中的交互 5.2 按钮响应(Button) 5.3 热区响应 5.4 热件响应 5.5 目标区域响应 5.6 菜单响应 5.7 条件响应 5.8 文本输入响应 5.9 按键响应 5.10 尝试次数限制响应 5.11 时间限制响应
文档格式:PPT 文档大小:7.33MB 文档页数:86
一、概述 二、 SPSS13.0的界面的认识 三、 变量的定义和数据的输入 四、 数据常用的一些编辑 五、 常用统计学方法 六、 曲线的绘制
首页上页127128129130131132133134下页末页
热门关键字
搜索一下,找到相关课件或文库资源 2601 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有