Method and System that uses tokens to authenticate entities. The person reading the token should also poses a similar token. Each entity is represented by a set of tokens. A token set consist out of a public token, a private token and a password. Public and private are via an asymmetrical encryption.....
[更多]
The method is based on the replacement position of non-adjacent pairs of nodes. Replacement of non-adjacent pairs of nodes is a fundamental change in the shape of two-stage oriented graph and matrix connection circular road transport network . Do local optimum price is reached by checking the possib.....
[更多]
The present invention relates to a folding balustrade for at least temporarily delimiting a zone, comprising a number of bars which extend between a lower section and an upper section, wherein the bars are articulated to the lower section and the upper section and wherein at least one section compr.....
[更多]
| |< <- | [108] [109] [110] [111] [112] [113] [114] [115] [116] [117] [118] |
