Description: 一.算法介绍:
**数据结构:
1.可利用资源向量Available
2.最大需求矩阵Max
3.分配矩阵Allocation
4.需求矩阵Need
**功能介绍:
模拟实现Dijkstra的银行家算法以避免死锁的出现.分两部分组成:
第一部分:银行家算法(扫描)
1.如果Request<=Need,则转向2 否则,出错
2.如果Request<=Available,则转向3,否则等待
3.系统试探分配请求的资源给进程
4.系统执行安全性算法
第二部分:安全性算法
1.设置两个向量
(1).工作向量:Work=Available(表示系统可提供给进程继续运行所需要的各类资源数目)
(2).Finish:表示系统是否有足够资源分配给进程(True:有 False:没有).初始化为False
2.若Finish[i]=False&&Need<=Work,则执行3 否则执行4(I为资源类别)
3.进程P获得第i类资源,则顺利执行直至完成!并释放资源:
Work=Work+Allocation
Finish[i]=true
转2
4. 若所有进程的Finish[i]=true,则表示系统安全 否则,不安全!-one. Algorithm introduced : ** Data Structure : 1. The resources available vector Available 2. The biggest demand matrix Max 3. Allocation distribution matrix 4. Need ** demand matrix function presentations : Simulation of bankers Dijkstra algorithm to avoid the emergence of deadlock. Composed of two parts : Part I : bankers algorithm (scanning) 1. If Requestlt; = Need, has turned two Otherwise, the two errors. If Requestlt; = Available, has turned three, or wait for the three. System testing requested resource allocation process to four. Safety system for the implementation of the second part of algorithm : a security algorithm. Set up two vector (1). Vector work : Work = Available (expressed system available to the continued operation of the process required number of resources of all ki Platform: |
Size: 7881 |
Author:李琪 |
Hits:
Description: 模拟实现Dijkstra的银行家算法以避免死锁的出现.分两部分组成:
第一部分:银行家算法(扫描)第二部分:安全性算法
-Simulation bankers Dijkstra algorithm to avoid the emergence of deadlock. Composed of two parts : Part I : bankers algorithm (scanning) Part 2 : Security Algorithm Platform: |
Size: 3122 |
Author:王国强 |
Hits:
Description: 说明:
1、里面有什么:
1.1、org.bouncycastle.*下的所有软件是bouncycastle组织开发的软件包
1.2、org.infosecurity.*下的软件包括:
DES_CBC算法的实现
RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证)
数字信封的实现
利用数字信封实现大文件的加密、解密。
2、有什么用:
2.1 研究、学习信息安全中的密码学设计与实现技术。
2.2 当然如果大家觉得在其它地方用的上,我会觉得很高兴的。
3、还有什么改进:
3.1 对文件加密、解密的时候要频繁的IO,如果加一个缓冲区,比如10K、50K等,
只有缓冲区满了才写入DISK这样将提高效率。
3.2 RSA私钥积存的时候可以按PKCS8形式,再经BASE64编码保存比较好。-Note : 1, mean there : 1.1, org.bouncycastle .* of all software development organizations is bouncycastle package 1.2, org.infosecurity .* The software includes : DES_CBC algorithm to achieve the realization of the RSA algorithm (including : key generation, public key and private key encryption decryption, digital signatures and signature verification), the realization of digital envelope using digital envelope realize document encryption, decryption. Two, what is the use of : 2.1, learning the information security cryptography design and technology. 2.2 Of course, if you think in the other parts, I feel very happy. Three, what is there for improvement : 3.1 pairs of file encryption, decryption, and the time to frequent the IO, plus a buffer, such as 10K, 50K, the only buffer is needed for Platform: |
Size: 213582 |
Author:雷敏 |
Hits:
Description: 银行家算法 利用C++编写,其中安全性算法我采用了变量的控制,比较简单,对与初学着来说,是一个非常好的例子-bankers algorithm using C + +, security algorithm I use the control variable, relatively simple, with a beginner, it is a very good example Platform: |
Size: 9380 |
Author:yang |
Hits:
Description: Wireless Security is a vast topic and any attempt to address all issues in a single book
is a daunting task. It is almost impossible to explain each and every security algorithm
that is used in wireless security in detail in a single volume. Platform: |
Size: 2599101 |
Author:yeahelton@hotmail.com |
Hits:
Description: 银行家算法 利用C++编写,其中安全性算法我采用了变量的控制,比较简单,对与初学着来说,是一个非常好的例子-bankers algorithm using C++, security algorithm I use the control variable, relatively simple, with a beginner, it is a very good example Platform: |
Size: 9216 |
Author:yang |
Hits:
Description: 维吉尼亚(Vigenere)密码为了提高密码的破译的难度,人们有发明一种多表置换的密码,即一个明文字母可以表示为多个密文字母,多表密码加密算法结果将使得对单表置换用的简单频率分析方法失效,其中维吉尼亚密码就是一种典型的加密方法。维吉尼亚密码是使用一个词组(语句)作为密钥,词组中每一个字母都作为移位替换密码密钥确定一个替换表,维吉尼亚密码循环的使用每一个替换表完成明文字母到密文字母的变换,最后所得到的密文字母序列即为加密得到的密文,具体过程如下: 设密钥 ,明文 , 加密变换 其中 例如,M=data security,k=best。可以先将M分解为长为4的序列data secu rity 每一节利用密钥k=best加密得密文c=Ek(M)=EELT TIUN SMLR。 当密钥k取的词组很长时,截获者就很难将密文破解。(我们还在计算机上就维吉尼亚密码设计的方法,编写了一个小的程序,可以运用其进行加密和相应的解密。见附录) 由于我们知识和条件所限,本学期对以上6种古典加密方法进行了学习和研究,从中我们收获颇多,我们了解古典密码学的基本原理和方法,并能够对信息进行简单的加密和解密,大大提高我们的学习文化知识的兴趣和热情,如果有条件我们在今后将进一步研究密码学。-Virginia (Vigenere) password to the password to raise the difficulty deciphering, people have invented a multi-table replacement passwords, or express a letter can be expressed as a number of secret alphabet, multi-table password encryption algorithm results will enable replacement of single table with a simple frequency analysis method failure, which Vij Caledonia is a typical password encryption methods. Virginia is the use of a password phrase (statement) as a key, every phrase has a letter as a replacement shift key password table to determine a replacement, Virginia passwords for each cycle of replacement of a complete table of explicit letters of the alphabet secret transform, get in the end secret alphabet sequence namely the encrypted ciphertext, the specific process is as follows Platform: |
Size: 1024 |
Author:god |
Hits:
Description: des算法简单实现。它以64位的明文和56位的密钥作为输入,通过DES加密运算产生64位密文输出。其解密过程利用同以密钥和算法将密文还原成明文。因为java语言的安全性&网络处理能力强,所以就利用了java语言编写-des simple algorithm to achieve. It's expressly 64 and 56 as the key input, through DES encryption algorithms have 64 ciphertext output. Its use decryption process with a key and cipher algorithm reduced explicitly. Java language because of the security & network processing capability, on the use of the Java language Platform: |
Size: 7168 |
Author:leae |
Hits:
Description: 自己用Java编的Client-Server聊天程序,结合了网络通信、数据安全、多线程的知识
1.使用RSA算法完成DES密钥的分配;
2.使用MD5结合RSA算法完成对消息的签名;
3.对原有消息及签名提供机密性保护(用DES算法加密);
4.能够解密并验证签名的合法性
-Their use of Java made the Client-Server chat program, a combination of network communications, data security, knowledge of multi-threaded one. RSA algorithm using the completion of the distribution of DES keys 2. RSA algorithm combines the use of MD5 message to complete the signature 3. The original message and signature to provide confidentiality protection (with DES encryption algorithm) 4. Able to decrypt and verify the legitimacy of the signature Platform: |
Size: 8192 |
Author:Shadow |
Hits:
Description: 关于无线安全的一本好书,包括了二代、三代移动通信网络和无线局域网里面的安全协议和算法。-Wireless Security is a vast topic and any attempt to address all issues in a single book
is a daunting task. It is almost impossible to explain each and every security algorithm
that is used in wireless security in detail in a single volume. In writing this book, I
have tried to strike a balance between architectural overviews and minute details. The
aim of this book has been to answer questions like: How is wireless security different
from security of wireline networks? How has wireless security evolved with changes
in wireless networking? What is the architectural philosophy behind the design of
wireless security protocols? What are the loopholes in these protocols and how can
they be rectified in future designs? Platform: |
Size: 4146176 |
Author:秦中元 |
Hits:
Description: Analysis of the DVB Common Scrambling Algorithm (DVB-CSA) on FPGA implementation. Performance and Security. Platform: |
Size: 177152 |
Author:Birrax |
Hits: