Home

データ分散保存システム

image

Contents

1. Ae Bese IO 6 gt 1 Sl en ec BEE
2. 00000 10000 Verifiable Secret Dogg ng go OO00
3. 9 O 8
4. n nxpp000 6 e e a et HOUUUUU Verifiable Secret Sharing O 0
5. 1 Hideki IMAI Co authored T INOUE et al Essentials of Error Control Coding Techniques Academic Pr ess I nc 1990 2000000000000000 000 OOO OOO U0000000000000000 A Shamir How to Share a Secret 4 Communications of the ACM 22 1979 pp 612 613 5 E R Berlek amp Algebraic coding theory McGraw Hill Inc 1968 6 B Pfitzmann Digital Schemes Springer Verlag 1996 Signature 7 A Salomaa Public key Cryptography Springer Verlag 1990 8 Douglas R Stinson CRYPTOGRAPHY OO Ss p000000000 JAVA 00000 JAVvaopo00000000 JAVAD DO 0000000
6. 0000000 CCommunication CCommunication HoE RORE 00 95 00 0csessiong OU Goa 000000000000000 Interface 800000000000 O00 CUserlnterface 0 0 CJ ob 000 CSession 0 0 0O O CSession
7. RFC STD7Q OO TCP 000000 IPAQ HO syIspogo00000000 default 500ms 00 O OO0O0 jbo oodg 00000 00000 Linux UNIX O o00000000Linux 00000 00000000 7 5 CDiskFile DirBase CString ReadFile WriteFile 1 fa CUserIntert pl 1 serlnterface CHostMap i 1 1 job CJob NULL CSecutiryCheck CHistoryRecoder Reset userlD CString NULL passwd CString NULL SetUserlD CString amp AddHistory BOOL SetPassword CString amp GetHistory Check BOOL FindHistory GetJob CJob amp 0 mode DWORD 0 SetJob Job amp GetJob Job amp SetKeyData SetMode DWORD DoActoin GetKeyData IsAvailable BOOL KeyData BYTE n bExist gt CEncryption pJob CJob NULL on 1 pJob CJob NULL poo
8. 000 Sharing 0 0o00 lt al sare a ace en o nh aa 00000 O O CuUserinterface 00000 0000000000 CEncryption 0 00000 O 00000 CScatter O 0 0 0 O CGather 0000 000000 CCommunicationg 00000 ese a SE 0040000000 00000 Intel Pentiumill 500MH Z 64MB O 10GB HD 000000 Linux RedHat Ver7 2 PECO 00000 Intel Pentiumill 800M 421288 DO 0000 0000000000 Memory 20GB HD CSessiong 40000000 000000 Windows2000 0000000 0009800000000 0000000 800000000000 CUserlnterface 00000 Intel Pentiumill 800MHZ 128MB OOOO Cob M
9. 0 10 Theory and Practice CRC Press 1995 9 Bruce Schneier APPLIED CRYPTOGRAPHY Second Edition J ohn Wiley and Sons Inc 1996 10 R L Rivest A Shamir and L M Adelman On Digital Signatures and Public Cryptosystems Communications of the ACM vol 21 no 2 Feb 1978
10. emory 20GB HD OOOOOOOOOOOOOOO 000000 Linux RedHat Ver7 2 OCSessionG oooddg 0000000 00000000 CSessionQQO000000 OO O00 lt 25 lt 200000000000 0 0000000000000 CEncryption 00000 00 nk30 00000000 Linux CEncryption OO 56 CJobOOO0000 05 po0000800 200000000000 poda do paddga 00000000 DO da gp gg 0000000000000 pop000000000000CScatter DO da gg gd 0000000000000 DO da gg pg 0000000000000 000 Cod 00000 CSession Joa CDecryption

Download Pdf Manuals

image

Related Search

Related Contents

Estudio de herramientas para la gestión de repositorios digitales  APart TNW-PRG6 remote control  

Copyright © All rights reserved.
Failed to retrieve file