期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
金山书信通2000
1
《大众软件》 2000年第9期9-9,共1页
金山书信通2000提供数百种中英文对照书信模板,支持直接修改、任意剪贴,可以直接以邮件传真形式发出信件。软件内置公务信函,涵盖行政事务、信息传播、公关礼仪、经济文书、涉外商务、司法诉讼等诸多领域;商业信函涉及人力资源管理... 金山书信通2000提供数百种中英文对照书信模板,支持直接修改、任意剪贴,可以直接以邮件传真形式发出信件。软件内置公务信函,涵盖行政事务、信息传播、公关礼仪、经济文书、涉外商务、司法诉讼等诸多领域;商业信函涉及人力资源管理、商业关系、询价、订货、报价、付款、装运、索赔等方方面面; 展开更多
关键词 “金山书信通2000” 中英文对照书信模板 公务信函 工具软件
原文传递
红色正版风暴风云再起—金山三通
2
作者 PCD实验室 《计算机应用文摘》 2002年第3期22-23,共2页
关键词 金山公司 软件 单词 书信通 打字
下载PDF
金山三通重出江湖
3
《软件世界(PC任我行)》 2002年第3期55-57,共3页
关键词 《金山单词2002》 《金山打字2002》 《金山书信通2002》 应用软件
下载PDF
如何用俄语写信头和信尾
4
作者 赵明霄 《俄语学习》 1997年第1期54-57,共4页
关键词 收信人 商务书信 俄语名词 信头 非正式 单位名称 中国学生 书信通 政府官员 社会主义
下载PDF
金山——金山词霸系列软件
5
作者 范岳 《电子测试》 2000年第7期69-69,共1页
通过使用这些软件,不仅可以学习写信、练习打字和掌握英语单词,还可以掌握计算机的基本知识。
关键词 金山词霸 打字2000 单词2000 书信通2000
下载PDF
金山再袭红色风暴
6
《个人电脑》 2000年第7期26-26,共1页
倡导低价位软件的先锋金山公司目前推出了2000系列9个软件产品,我们评测了其中28元价位的三通产品,即“金山单词通”、“金山打字通”和“金山书信通”。 金山单词通2000 “金山单词通2000”是金山的主打产品,软件在最低系统配置(P133,1... 倡导低价位软件的先锋金山公司目前推出了2000系列9个软件产品,我们评测了其中28元价位的三通产品,即“金山单词通”、“金山打字通”和“金山书信通”。 金山单词通2000 “金山单词通2000”是金山的主打产品,软件在最低系统配置(P133,16MB内存,40MB硬盘)环境下运行,启动速度慢,且程序运行中频繁死机;将内存扩至64MB,硬盘空间在1G以上时,程序才运行较为流畅。另外一定要安装DirectX 5.0或以上版本,否则就只能听到背景音乐而听不到单词发音了。 “金山单词通2000”的软件功能是围绕8种记忆单词的方法来设计的,与它的前身及同类产品相比,避免了学习的单调性,随意性,使单词记忆趣味化,系统化,科学化,加强听、说、读、写的协调配合,提高了学习效率和效果。 展开更多
关键词 金山单词2000 金山打字2000 金山书信通2000
下载PDF
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
7
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution "Ping-pong" protocol extended three-particle GHZ state eavesdropping detection
下载PDF
Improvement on Quantum Secure Direct Communication with W State in Noisy Channel 被引量:4
8
作者 DONG Li XIU Xiao-Ming GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第2期232-234,共3页
An improvement (Y-protocol) [Commun. Theor. Phys. 49 (2008) 103] on the quantum secure direct communication with W state (C-protocol) [Chin. Phys. Lett. 23 (2006) 290] is proposed by Yuan et al. The quantum bi... An improvement (Y-protocol) [Commun. Theor. Phys. 49 (2008) 103] on the quantum secure direct communication with W state (C-protocol) [Chin. Phys. Lett. 23 (2006) 290] is proposed by Yuan et al. The quantum bit error rate induced by eavesdropper is 4.17% in C-protocol and 6.25% in Y-protocoL In this paper, another improvement on C-protocol is given. The quantum bit error rate of the eavesdropping will increase to 8.75%, which is 1.1 times larger than that in C-protocol and 0.4 times larger than that in Y-protocol. 展开更多
关键词 quantum cryptography quantum secure direct communication W state
下载PDF
AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL
9
作者 Wang Changji Yang Bo Wu Jianping 《Journal of Electronics(China)》 2005年第5期485-489,共5页
In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are describ... In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations. 展开更多
关键词 Authenticated key agreement Modification attack Computational Diffie-Hellman Assumption
下载PDF
Promotion of library management and book circulation to research on medical research
10
作者 Chengbi ZHENG 《International Journal of Technology Management》 2014年第12期22-24,共3页
With the acceleration of the process of social information, information resources construction has become an important part of national development strategies. The library is one of the main information resources cons... With the acceleration of the process of social information, information resources construction has become an important part of national development strategies. The library is one of the main information resources constructions and is an important information resource position of social construction. Computer applications in the book management, greatly improve the management efficiency of the library, and have changed the traditional management service model. Universal service network extends to every comer make reader can read everywhere, breaking the boundaries of time and space and also greatly promoting the modernization of the library. Library modernization, according to the characteristics of the objective law refers library work practices, uses modem technological conditions, rational organization of scientific management of library work, to maximize efficiency and quality and effectively complete the task library. Library essence of modem management techniques is to achieve the modernization of libraries and library management modernization. Modem library information system can be divided into three aspects of building automation libraries, library networks and digital libraries. Digital library management directly reflects a country' s level of a regional knowledge economy and information industry development, and digital network resource management in the book gradually dominates. 展开更多
关键词 library management book circulation medical research
下载PDF
金山三通
11
《大众软件》 2002年第6期26-27,共2页
关键词 应用软件 《金山单词2002》 《金山打字 《金山书信通
原文传递
日纸述朝鲜复国原因──武力主义促成之
12
《当代韩国》 1994年第1期39-39,共1页
日纸述朝鲜复国原因──武力主义促成之四月十九日上海日报载称韩人之行动虽渐见平稳,然其内容日趋于危险,溯起原因,……自长谷川总督就任以来,不能恩威并用。他若宪兵制度,当合并之时虽属必要,然行政各部已组织完全,秩序亦且恢... 日纸述朝鲜复国原因──武力主义促成之四月十九日上海日报载称韩人之行动虽渐见平稳,然其内容日趋于危险,溯起原因,……自长谷川总督就任以来,不能恩威并用。他若宪兵制度,当合并之时虽属必要,然行政各部已组织完全,秩序亦且恢复之后,渐难适用。即征诸此次复国运... 展开更多
关键词 武力 教育方针 殖民地 成绩不良 恩威并用 民国日报 书信通 根本改革 西伯利亚 重要问题
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部