According to the definition of random experimentation and the demand of random sequence in cryptogra-phy, three typical methods to rectify the deviation of rand
In order to improve the performance of Linux network,new protocols should be implemented and added in original protocol stack. For this demand,this paper has an
Information security is a part of the core of computer field. This existing PKI system can not satisfy themore and more demand from people. Simple Public Key In
The development of Information System has been experienced four phases: Computing Central ,Data Cen-tral,Object Central phase,and Model Central phase under deve
Petri Net(PN) is a very important modeling methodology for dynamic concurrent system. Many PN modelsare available in existing literature,but a little attention