Discrete-chaotic-cryptography.rar

  • PUDN用户
    了解作者
  • C/C++
    开发工具
  • 146KB
    文件大小
  • rar
    文件格式
  • 0
    收藏次数
  • 1 积分
    下载积分
  • 5
    下载次数
  • 2012-04-16 11:08
    上传日期
一篇关于加解密的论文,介绍混沌密码学中简单的加解密知识,希望对大家有所帮助
Discrete-chaotic-cryptography.rar
  • Discrete chaotic cryptography
  • Discrete chaotic cryptography.pdf
    165.8KB
内容介绍
<html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta charset="utf-8"> <meta name="generator" content="pdf2htmlEX"> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"> <link rel="stylesheet" href="https://static.pudn.com/base/css/base.min.css"> <link rel="stylesheet" href="https://static.pudn.com/base/css/fancy.min.css"> <link rel="stylesheet" href="https://static.pudn.com/prod/directory_preview_static/622b6d7915da9b288bc09a40/raw.css"> <script src="https://static.pudn.com/base/js/compatibility.min.js"></script> <script src="https://static.pudn.com/base/js/pdf2htmlEX.min.js"></script> <script> try{ pdf2htmlEX.defaultViewer = new pdf2htmlEX.Viewer({}); }catch(e){} </script> <title></title> </head> <body> <div id="sidebar" style="display: none"> <div id="outline"> </div> </div> <div id="pf1" class="pf w0 h0" data-page-no="1"><div class="pc pc1 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/622b6d7915da9b288bc09a40/bg1.jpg"><div class="t m0 x1 h2 y1 ff1 fs0 fc0 sc0 ls0 ws0">Physics<span class="_"> </span>L<span class="_ _0"></span>etters<span class="_"> </span>A<span class="_ _1"> </span>309<span class="_"> </span>(2003)<span class="_ _1"> </span>75&#8211;82</div><div class="t m0 x2 h2 y2 ff1 fs0 fc1 sc0 ls1 ws0">www<span class="_ _2"></span>.elsevier<span class="_ _2"></span>.com/locate/pla</div><div class="t m0 x3 h3 y3 ff1 fs1 fc0 sc0 ls2 ws0">Discrete<span class="_"> </span>chaotic<span class="_ _3"> </span>cryptography<span class="_ _3"> </span>using<span class="_"> </span>e<span class="_ _2"></span>xternal<span class="_ _3"> </span>ke<span class="_ _2"></span>y</div><div class="t m0 x4 h4 y4 ff1 fs2 fc0 sc0 ls3 ws0">N.K.<span class="_"> </span>P<span class="_ _2"></span>areek</div><div class="t m0 x5 h2 y5 ff1 fs0 fc0 sc0 ls4 ws0">a<span class="ff2">,</span>b</div><div class="t m0 x6 h4 y4 ff1 fs2 fc0 sc0 ls5 ws0">,<span class="_"> </span>V<span class="_ _4"></span>inod<span class="_"> </span>P<span class="_ _2"></span>atidar</div><div class="t m0 x7 h2 y5 ff1 fs0 fc0 sc0 ls4 ws0">a</div><div class="t m0 x8 h4 y4 ff1 fs2 fc0 sc0 ls6 ws0">,K<span class="_ _5"></span>.<span class="_ _5"></span>K<span class="_ _5"></span>.S<span class="_ _5"></span>u<span class="_ _5"></span>d</div><div class="t m0 x9 h2 y5 ff1 fs0 fc0 sc0 ls4 ws0">a<span class="ff2">,</span>b<span class="ff2">,<span class="ff3">&#8727;</span></span></div><div class="t m0 xa h5 y6 ff1 fs3 fc0 sc0 ls4 ws0">a</div><div class="t m0 xb h6 y7 ff4 fs0 fc0 sc0 ls7 ws0">Department<span class="_ _1"> </span>of<span class="_"> </span>Physics,<span class="_ _1"> </span>Colle<span class="_ _2"></span>ge<span class="_ _1"> </span>of<span class="_"> </span>Science<span class="_ _1"> </span>Campus,<span class="_ _1"> </span>M.L.S.<span class="_"> </span>University<span class="_ _2"></span>,<span class="_ _1"> </span>Udaipur<span class="_ _1"> </span>313002,<span class="_"> </span>India</div><div class="t m0 xc h5 y8 ff1 fs3 fc0 sc0 ls4 ws0">b</div><div class="t m0 xd h6 y9 ff4 fs0 fc0 sc0 ls8 ws0">Computer<span class="_ _1"> </span>Centre<span class="_ _2"></span>,<span class="_"> </span>M.<span class="_ _0"></span>L.S.<span class="_"> </span>University<span class="_ _2"></span>,<span class="_ _1"> </span>Udaipur<span class="_ _1"> </span>313002,<span class="_ _1"> </span>India</div><div class="t m0 xe h2 ya ff1 fs0 fc0 sc0 ls9 ws0">Recei<span class="_ _2"></span>ved<span class="_ _1"> </span>23<span class="_"> </span>October<span class="_ _1"> </span>2002;<span class="_"> </span>received<span class="_ _1"> </span>in<span class="_"> </span>revised<span class="_"> </span>form<span class="_ _1"> </span>24<span class="_"> </span>December<span class="_ _1"> </span>2002;<span class="_ _1"> </span>accepted<span class="_ _1"> </span>7<span class="_"> </span>January<span class="_ _1"> </span>2003</div><div class="t m0 xf h2 yb ff1 fs0 fc0 sc0 lsa ws0">Communicated<span class="_ _1"> </span>by<span class="_"> </span>C.<span class="_ _0"></span>R.<span class="_"> </span>Doering</div><div class="t m0 x10 h7 yc ff5 fs4 fc0 sc0 lsb ws0">Abstract</div><div class="t m0 x11 h8 yd ff1 fs4 fc0 sc0 lsb ws0">In<span class="_"> </span>this<span class="_"> </span>Letter<span class="_ _2"></span>,<span class="_ _6"> </span>we<span class="_"> </span>propose<span class="_"> </span>a<span class="_"> </span>symmetric<span class="_"> </span>k<span class="_ _2"></span>ey<span class="_"> </span>block<span class="_ _6"> </span>cipher<span class="_"> </span>algorithm<span class="_"> </span>utilizing<span class="_"> </span>the<span class="_"> </span>essence<span class="_"> </span>of<span class="_"> </span>chaos.<span class="_"> </span>The<span class="_ _6"> </span>proposed<span class="_ _1"> </span>cryptosystem</div><div class="t m0 x10 h8 ye ff1 fs4 fc0 sc0 lsc ws0">does<span class="_ _7"> </span>not<span class="_"> </span>use<span class="_ _7"> </span>explicitly<span class="_"> </span>the<span class="_ _7"> </span>system<span class="_"> </span>parameter<span class="_ _7"> </span>or<span class="_"> </span>initial<span class="_ _7"> </span>condition<span class="_"> </span>of<span class="_ _7"> </span>the<span class="_ _1"> </span>chaotic<span class="_ _7"> </span>map<span class="_ _1"> </span>as<span class="_ _7"> </span>a<span class="_"> </span>secret<span class="_ _7"> </span>ke<span class="_ _2"></span>y<span class="_ _4"></span>.<span class="_ _7"> </span>Howe<span class="_ _2"></span>v<span class="_ _2"></span>er<span class="_ _2"></span>,<span class="_ _1"> </span>these<span class="_ _7"> </span>parameters</div><div class="t m0 x10 h8 yf ff1 fs4 fc0 sc0 lsd ws0">are<span class="_"> </span>g<span class="_ _2"></span>enerated<span class="_"> </span>by<span class="_ _6"> </span>an<span class="_"> </span>e<span class="_ _2"></span>xternal<span class="_"> </span>secret<span class="_ _6"> </span>k<span class="_ _2"></span>ey<span class="_"> </span>of<span class="_ _6"> </span>v<span class="_ _4"></span>ar<span class="_ _0"></span>iable<span class="_"> </span>length<span class="_ _6"> </span>(maximum<span class="_"> </span>128-bits)<span class="_"> </span>and<span class="_ _6"> </span>used<span class="_ _6"> </span>in<span class="_"> </span>our<span class="_ _6"> </span>algorithm.<span class="_"> </span>The<span class="_ _6"> </span>encryption<span class="_"> </span>of<span class="_ _6"> </span>each</div><div class="t m0 x10 h8 y10 ff1 fs4 fc0 sc0 lse ws0">block<span class="_"> </span>of<span class="_ _6"> </span>plaintext<span class="_ _6"> </span>has<span class="_"> </span>been<span class="_ _6"> </span>made<span class="_ _6"> </span>dependent<span class="_"> </span>on<span class="_ _6"> </span>the<span class="_ _6"> </span>secret<span class="_"> </span>ke<span class="_ _2"></span>y<span class="_ _6"> </span>and<span class="_"> </span>the<span class="_ _6"> </span>cryptosystem<span class="_"> </span>is<span class="_ _6"> </span>further<span class="_"> </span>made<span class="_ _6"> </span>robust<span class="_ _6"> </span>against<span class="_ _6"> </span>any<span class="_ _6"> </span>reasonable</div><div class="t m0 x10 h8 y11 ff1 fs4 fc0 sc0 lse ws0">attack<span class="_ _7"> </span>by<span class="_ _8"> </span>using<span class="_ _7"> </span>the<span class="_ _8"> </span>feedback<span class="_ _8"> </span>technique.<span class="_ _8"> </span>Simulati<span class="_ _0"></span>on<span class="_ _7"> </span>results<span class="_ _8"> </span>sho<span class="_ _2"></span>w<span class="_ _7"> </span>that<span class="_ _8"> </span>the<span class="_ _7"> </span>proposed<span class="_ _8"> </span>cryptosystem<span class="_ _8"> </span>requires<span class="_ _8"> </span>less<span class="_ _7"> </span>t<span class="_ _0"></span>ime<span class="_ _7"> </span>to<span class="_ _7"> </span>encrypt</div><div class="t m0 x10 h8 y12 ff1 fs4 fc0 sc0 lsf ws0">the<span class="_ _7"> </span>plainte<span class="_ _2"></span>xt<span class="_ _7"> </span>as<span class="_ _7"> </span>compare<span class="_ _2"></span>d<span class="_ _7"> </span>to<span class="_ _7"> </span>the<span class="_ _7"> </span>existin<span class="_ _2"></span>g<span class="_ _7"> </span>chaotic<span class="_ _7"> </span>crypto<span class="_ _2"></span>systems<span class="_ _7"> </span>and<span class="_ _7"> </span>further<span class="_"> </span>produces<span class="_ _7"> </span>the<span class="_ _7"> </span>cipherte<span class="_ _2"></span>xt<span class="_ _7"> </span>hav<span class="_ _2"></span>ing<span class="_ _7"> </span>&#64258;at<span class="_ _7"> </span>distrib<span class="_ _2"></span>ution<span class="_"> </span>of</div><div class="t m0 x10 h8 y13 ff1 fs4 fc0 sc0 ls10 ws0">same<span class="_"> </span>size<span class="_"> </span>as<span class="_"> </span>the<span class="_"> </span>p<span class="_ _2"></span>laintext.</div><div class="t m0 x10 h9 y14 ff6 fs0 fc0 sc0 ls4 ws0">&#63193;<span class="_ _1"> </span><span class="ff1 fs4 ls11">2003<span class="_"> </span>E<span class="_ _0"></span>lsevier<span class="_"> </span>Science<span class="_"> </span>B.<span class="_ _0"></span>V<span class="_ _9"></span>.<span class="_"> </span>All<span class="_"> </span>r<span class="_ _0"></span>ights<span class="_"> </span>r<span class="_ _0"></span>eserved.</span></div><div class="t m0 x10 h2 y15 ff4 fs0 fc0 sc0 ls12 ws0">PA<span class="_ _0"></span>C<span class="_ _a"></span>S<span class="_ _a"></span>:<span class="_ _1"> </span><span class="ff1 ls13">05.45.<span class="_ _0"></span>+b</span></div><div class="t m0 x10 h2 y16 ff4 fs0 fc0 sc0 ls13 ws0">Ke<span class="_ _4"></span>ywords:<span class="_ _1"> </span><span class="ff1 ls14">Discrete<span class="_"> </span>chaotic<span class="_ _1"> </span>cryptography<span class="_ _7"> </span>(DCC);<span class="_"> </span>Block<span class="_ _1"> </span>ciphers;<span class="_ _1"> </span>Secret-key<span class="_"> </span>cryptography</span></div><div class="t m0 x10 ha y17 ff5 fs5 fc0 sc0 ls15 ws0">1.<span class="_ _b"> </span>Intr<span class="_ _2"></span>oduction</div><div class="t m0 x12 hb y18 ff1 fs5 fc0 sc0 ls16 ws0">The<span class="_"> </span>techni<span class="_ _2"></span>ques<span class="_ _1"> </span>of<span class="_"> </span>secure<span class="_ _1"> </span>communicat<span class="_ _2"></span>ion<span class="_ _1"> </span>by<span class="_"> </span>w<span class="_ _2"></span>hich</div><div class="t m0 x10 hb y19 ff1 fs5 fc0 sc0 ls17 ws0">one<span class="_"> </span>can<span class="_ _1"> </span>transmit<span class="_ _1"> </span>con&#64257;dential<span class="_ _1"> </span>mess<span class="_ _2"></span>ages<span class="_"> </span>secreti<span class="_ _4"></span>vely<span class="_"> </span>are</div><div class="t m0 x10 hb y1a ff1 fs5 fc0 sc0 ls18 ws0">of<span class="_ _3"> </span>practical<span class="_ _c"> </span>interest<span class="_ _c"> </span>in<span class="_ _3"> </span>se<span class="_ _2"></span>veral<span class="_ _c"> </span>areas,<span class="_ _3"> </span>includi<span class="_ _2"></span>ng<span class="_ _c"> </span>data-</div><div class="t m0 x10 hb y1b ff1 fs5 fc0 sc0 ls19 ws0">bases,<span class="_"> </span>internet<span class="_"> </span>banking,<span class="_ _1"> </span>soft<span class="_ _2"></span>wares,<span class="_"> </span>protecti<span class="_ _2"></span>on<span class="_"> </span>of<span class="_"> </span>com-</div><div class="t m0 x10 hb y1c ff1 fs5 fc0 sc0 ls19 ws0">munication<span class="_ _1"> </span>channel<span class="_ _2"></span>s<span class="_"> </span>etc.<span class="_"> </span>A<span class="_ _1"> </span>cryptosys<span class="_ _2"></span>tem<span class="_ _1"> </span>is<span class="_"> </span>si<span class="_ _2"></span>mply<span class="_"> </span>an</div><div class="t m0 x10 hb y1d ff1 fs5 fc0 sc0 ls1a ws0">algorith<span class="_ _0"></span>m<span class="_ _3"> </span>th<span class="_ _0"></span>at<span class="_ _3"> </span>co<span class="_ _0"></span>n<span class="_ _2"></span>verts<span class="_ _3"> </span>an<span class="_ _d"> </span>origin<span class="_ _0"></span>al<span class="_ _3"> </span>intelligible<span class="_ _d"> </span>mes-</div><div class="t m0 x10 hb y1e ff1 fs5 fc0 sc0 ls1b ws0">sage,<span class="_ _b"> </span>referred<span class="_ _b"> </span>as<span class="_ _e"> </span>plainte<span class="_ _2"></span>xt,<span class="_ _e"> </span>into<span class="_ _b"> </span>apparently<span class="_ _e"> </span>random</div><div class="t m0 x10 hb y1f ff1 fs5 fc0 sc0 ls1c ws0">non-sense<span class="_ _8"> </span>message,<span class="_ _8"> </span>referred<span class="_ _8"> </span>as<span class="_ _c"> </span>ciphert<span class="_ _2"></span>ext<span class="_ _7"> </span>and<span class="_ _c"> </span>recov-</div><div class="t m0 x10 hb y20 ff1 fs5 fc0 sc0 ls1b ws0">ers<span class="_ _c"> </span>the<span class="_ _c"> </span>message<span class="_ _c"> </span>back<span class="_ _c"> </span>i<span class="_ _2"></span>n<span class="_ _c"> </span>its<span class="_ _c"> </span>original<span class="_ _c"> </span>form.<span class="_ _c"> </span>The<span class="_ _c"> </span>cryp-</div><div class="t m0 x11 h5 y21 ff1 fs3 fc0 sc0 ls4 ws0">*</div><div class="t m0 x13 h2 y22 ff1 fs0 fc0 sc0 ls1d ws0">Corresponding<span class="_ _1"> </span>author<span class="_ _2"></span>.</div><div class="t m0 x13 h2 y23 ff4 fs0 fc0 sc0 ls1e ws0">E-mail<span class="_ _1"> </span>addr<span class="_ _2"></span>ess:<span class="_ _1"> </span><span class="ff1 ls1f">kksud@yahoo.com<span class="_ _1"> </span>(K.K.<span class="_"> </span>Sud).</span></div><div class="t m0 x14 hb y17 ff1 fs5 fc0 sc0 ls20 ws0">tosystems<span class="_ _c"> </span>a<span class="_ _2"></span>vailable<span class="_ _8"> </span>in<span class="_ _c"> </span>the<span class="_ _c"> </span>literature<span class="_ _8"> </span>can<span class="_ _c"> </span>be<span class="_ _c"> </span>discussed</div><div class="t m0 x14 hb y24 ff1 fs5 fc0 sc0 ls20 ws0">with<span class="_"> </span>respect<span class="_"> </span>to<span class="_"> </span>the<span class="_"> </span>fo<span class="_ _0"></span>llowing<span class="_ _1"> </span>aspects:</div><div class="t m0 x15 hb y25 ff3 fs5 fc0 sc0 ls4 ws0">&#8226;<span class="_ _b"> </span><span class="ff1 ls21">Structure<span class="_ _1"> </span>of<span class="_ _1"> </span>the<span class="_ _1"> </span>encryption<span class="_ _6"> </span>algorithm;</span></div><div class="t m0 x15 hb y26 ff3 fs5 fc0 sc0 ls4 ws0">&#8226;<span class="_ _b"> </span><span class="ff1 ls1b">Method<span class="_"> </span>of<span class="_ _1"> </span>dis<span class="_ _2"></span>trib<span class="_ _2"></span>ution<span class="_ _1"> </span>of<span class="_"> </span>s<span class="_ _2"></span>ecret<span class="_"> </span>ke<span class="_ _2"></span>ys;</span></div><div class="t m0 x15 hb y27 ff3 fs5 fc0 sc0 ls4 ws0">&#8226;<span class="_ _b"> </span><span class="ff1 ls22">Method<span class="_"> </span>of<span class="_ _1"> </span>const<span class="_ _2"></span>ructing<span class="_ _1"> </span>a<span class="_ _2"></span>lgorithms.</span></div><div class="t m0 x14 hb y28 ff1 fs5 fc0 sc0 ls23 ws0">Based<span class="_ _d"> </span>on<span class="_ _d"> </span>the<span class="_ _e"> </span>structure<span class="_ _3"> </span>of<span class="_ _e"> </span>the<span class="_ _d"> </span>encryption<span class="_ _3"> </span>algorithm</div><div class="t m0 x14 hb y29 ff1 fs5 fc0 sc0 ls24 ws0">we<span class="_ _e"> </span>can<span class="_ _b"> </span>classify<span class="_ _e"> </span>cryptosystems<span class="_ _e"> </span>into<span class="_ _e"> </span>two<span class="_ _b"> </span>categories,</div><div class="t m0 x14 hb y2a ff1 fs5 fc0 sc0 ls25 ws0">namely<span class="_ _4"></span>,<span class="_ _c"> </span>stream<span class="_ _c"> </span>cipher<span class="_ _c"> </span>and<span class="_ _3"> </span>block<span class="_ _c"> </span>cipher<span class="_ _4"></span>.<span class="_ _c"> </span>In<span class="_ _3"> </span>a<span class="_ _c"> </span>stream</div><div class="t m0 x14 hb y2b ff1 fs5 fc0 sc0 ls26 ws0">cipher<span class="_ _8"> </span>algorithm,<span class="_"> </span>the<span class="_ _c"> </span>message<span class="_ _7"> </span>is<span class="_ _c"> </span>encrypted<span class="_ _8"> </span>bit-by-bit</div><div class="t m0 x14 hb y2c ff1 fs5 fc0 sc0 ls24 ws0">with<span class="_ _8"> </span>the<span class="_ _8"> </span>application<span class="_"> </span>of<span class="_ _8"> </span>a<span class="_ _8"> </span>secret<span class="_ _8"> </span>ke<span class="_ _2"></span>y<span class="_ _8"> </span>generator<span class="_"> </span>and<span class="_ _8"> </span>the</div><div class="t m0 x14 hb y2d ff1 fs5 fc0 sc0 ls23 ws0">decryption<span class="_ _6"></span>can<span class="_ _6"> </span>be<span class="_ _6"> </span>done<span class="_ _6"> </span>by<span class="_ _1"> </span>usi<span class="_ _2"></span>ng<span class="_ _6"> </span>the<span class="_ _1"> </span>s<span class="_ _2"></span>ame<span class="_ _6"> </span>algorithm<span class="_ _6"> </span>as</div><div class="t m0 x14 hb y2e ff1 fs5 fc0 sc0 ls27 ws0">in<span class="_"> </span>encryption,<span class="_ _6"> </span>and<span class="_"> </span>with<span class="_"> </span>the<span class="_"> </span>same<span class="_ _1"> </span>secret-ke<span class="_ _2"></span>y<span class="_"> </span>generator<span class="_ _4"></span>.</div><div class="t m0 x14 hb y2f ff1 fs5 fc0 sc0 ls25 ws0">In<span class="_"> </span>practice,<span class="_ _1"> </span>s<span class="_ _2"></span>hift<span class="_"> </span>re<span class="_ _2"></span>gister<span class="_ _4"></span>,<span class="_"> </span>non-linear<span class="_ _6"> </span>combination<span class="_"> </span>gen-</div><div class="t m0 x10 h9 y30 ff1 fs0 fc0 sc0 ls28 ws0">0375-9601/03/$<span class="_ _1"> </span>&#8211;<span class="_"> </span>see<span class="_ _1"> </span>front<span class="_"> </span>matter<span class="_ _d"> </span><span class="ff6 ls4">&#63193;<span class="_"> </span></span><span class="ls29">2003<span class="_"> </span>E<span class="_ _0"></span>lsevier<span class="_"> </span>Science<span class="_ _1"> </span>B.V<span class="_ _9"></span>.<span class="_ _1"> </span>All<span class="_"> </span>rights<span class="_ _1"> </span>reserved.</span></div><div class="t m0 x10 h2 y31 ff1 fs0 fc0 sc0 ls2a ws0">doi:10.1016/S0375-9601(03)00122-1</div><a class="l" rel='nofollow' onclick='return false;'><div class="d m1"></div></a></div><div class="pi" data-data='{"ctm":[1.758242,0.000000,0.000000,1.758242,-43.956044,-87.912088]}'></div></div> </body> </html>
评论
    相关推荐
    • 数据库课程设计
      数据库课程设计使用,使用MFC编写的界面,连接ODBC数据源,方便移植。
    • 数据库课程设计
      一个数据库课程设计,access管理工具实现,用的是窗体!
    • 数据库课程设计
      广东工业大学数据库课程设计,可视化界面连接数据库,delphi7
    • 数据库课程设计
      数据库课程设计实验及其描述 数据库课程设计实验及其描述 数据库课程设计实验及其描述 数据库课程设计实验及其描述 数据库课程设计实验及其描述 数据库课程设计实验及其描述
    • 数据库课程设计
      数据库课程设计》由周爱武、汪海威、肖云编著,遵循数据库课程设计的具体要求,独立于具体的数据库教材,从实际应用系统的需求着手,引导读者逐步完成数据库设计全过程,重点讲解数据库系统的需求分析、概念设计、...
    • 数据库课程设计
      数据库课程设计人事管理系统 数据库课程设计人事管理系统数据库课程设计人事管理系统数据库课程设计人事管理系统数据库课程设计人事管理系统数据库课程设计人事管理系统数据库课程设计人事管理系统数据库课程设计...
    • 数据库课程设计
      数据库课程设计,基于visual basic自助银行管理系统,界面很清爽,实用。同学都说好,所以就上传了!!!
    • 数据库课程设计
      数据库课程设计 里面有详细的文档资料 包含数据库一切的图 以及生成的数据库表文件 期末得分为优秀
    • 数据库课程设计
      可以作为数据库课程设计,也可以作为Java的课程设计,内容全面。本资源转载的,非本人原创。用于交流学习,特此申明!
    • 数据库课程设计
      数据库课程设计蓝天大学学生管理系统 2.商店信息管理系统 3.实验室机房收费管理系统 4.图书馆资料检索系统 5.企业库存管理系统 6.仓库管理系统 7.工程项目管理系统 8.教材管理系统 9.企业人事管理系统 10.企业财务...