April 9, 2012

電腦作業-35

第35次 : 看完課本第八章第三節[加密與解密原理與技術簡介]後. 請參考課本及老師上課所舉之實例.自行設計一加密及解密的機制並舉例說明之. 明文 ~ 加密機制(Key) ~ 密文.

0推薦此文章
Today's Visitors: 0 Total Visitors: 1
Personal Category: Uncategorized Articles Topic: technology / tech info / hardware
[Trackback URL]

Reply
  • 1樓

    1樓搶頭香

    台灣辣妹一對一電愛
    24小時專線手機直撥551243

  • fdxriytgn at May 11, 2012 03:28 PM comment | email Homepage | prosecute
Post A Comment









Yes No



Please input the magic number:

( Prevent the annoy garbage messages )
( What if you cannot see the numbers? )
Please input the magic number

誰來收藏
Loading ...
unlog_NVPO 0