uva1262 Password【解法一】
来源:互联网 发布:女子防身知乎 编辑:程序博客网 时间:2024/05/16 10:57
Shoulder-surfing is the behavior of intentionally and stealthily
watching the screen of another person’s electronic device, such as
laptop computer or mobile phone. Since mobile devices prevail, it is
getting serious to steal personal information by shoulder-surfing.
Suppose that we have a smart phone. If we touch the screen keyboard
directly to enter the password, this is very vulnerable since a
shoulder-surfer easily knows what we have typed. So it is desirable to
conceal the input information to discourage shoulder-surfers around
us. Let me explain one way to do this. You are given a 6 5 grid.
Each column can be considered the visible part of a wheel. So you can
easily rotate each column wheel independently to make password
characters visible. In this problem, we assume that each wheel
contains the 26 upper letters of English alphabet. See the following
Figure 1. Figure 1. 6 5 window clips a valid grid representation for
a password. Assume that we have a length-5 password such as p 1 p 2 p
3 p 4 p 5 . In order to pass the authentication procedure, we should
construct a configuration of grid space where each p i appears in the
i
-th column of the grid. In that situation we say that the user password is accepted. Figure 2. A valid grid representation for
password ‘COMPU’. Let me start with one example. Suppose that our
password was set ‘COMPU’. If we construct the grid as shown in Figure
2 on next page, then the authentication is successfully processed. In
this password system, the position of each password charac- ter in
each column is meaningless. If each of the 5 characters in p 1 p 2 p 3
p 4 p 5 appears in the corresponding column, that can be considered
the correct password. So there are many grid configu- rations allowing
one password. Note that the sequence of letters on each wheel is
randomly determined for each trial and for each column. In practice,
the user is able to rotate each column and press “Enter” key, so a
should-surfer cannot perceive the password by observing the 6 5 grid
since there are too many password can- didates. In this 6 5 grid
space, maximally 6 5
= 7 ; 776 cases are possible. This is the basic idea of the proposed password system against shoulder-surfers. Unfortunately there is a
problem. If a shoulder-surfer can observe more than two grid plate
con- figurations for a person, then the shoulder-surfer can reduce the
searching space and guess the correct password. Even though it is not
easy to stealthily observe other’s more than once, this is one
weakness of implicit grid passwords. Let me show one example with two
observed configurations for a grid password. The user password is
‘COMPU’, but ‘DPMAG’ is also one candidate password derived from the
following configuration. Figure 3. Both of ‘COMPU’ and ‘DPMAG’ are
feasible password . You are given two configurations of grid password
from a shoulder-surfer. Suppose that you have succeeded to stealthily
record snapshots of the target person’s device (e.g. smart phone).
Then your next task is to reconstruct all possible passwords from
these two snapshots. Since there are lots of password candidates, you
are asked for the k
-th password among all candidates in lexicographical order. In Figure 3, let us show the first 5 valid password. The first 5 valid passwords
are ‘ABGAG’ , ‘ABGAS’, ‘ABGAU’, ‘ABGPG’ and ‘ABGPS’. The number k is
given in each test case differently. If there does not exist a k
-th password since k is larger than the number of all possible passwords, then you should print ‘ NO ’ in the output. Input Your
program is to read from standard input. The input consists of T test
cases. The number of test cases T is given in the first line of the
input. The first line of each test case contains one integer, K , the
order of the password you should find. Note that 1 K 7 ; 777 .
Next the following 6 lines show the 6 rows of the first grid and
another 6 lines represent the 6 rows of the second grid. Output Your
program is to write to standard output. Print exactly the k
-th password (including ‘ NO ’) in one line for each test case. The following shows sample input and output for three test cases.
解法二【暴力】见【这里】。
字典序解码。
#include<cstdio>#include<cstring>#include<vector>#include<algorithm>using namespace std;vector<char> v[7];char s1[10][10],s2[10][10];int k,n[7];bool init(){ int i,j,x,y,z; for (i=1;i<=5;i++) v[i].clear(); scanf("%d",&k); for (i=1;i<=6;i++) scanf("%s",s1[i]+1); for (i=1;i<=6;i++) scanf("%s",s2[i]+1); for (i=1;i<=5;i++) for (j=1;j<=6;j++) for (x=1;x<=6;x++) if (s1[j][i]==s2[x][i]) v[i].push_back(s1[j][i]); for (i=1;i<=5;i++) { if (v[i].empty()) return 0; sort(v[i].begin(),v[i].end()); unique(v[i].begin(),v[i].end()); n[i]=0; while (n[i]<v[i].size()-1&&v[i][n[i]+1]>v[i][n[i]]) n[i]++; n[i]++; } return 1;}void solve(){ int i,j,x,y,z,tot=1; for (i=1;i<=5;i++) tot*=n[i]; if (k>tot) { printf("NO\n"); return; } /*for (i=1;i<=5;i++) { tot/=n[i]; j=k/(tot+1); printf("%c",v[i][j]); k-=j*tot; }*/ k--; for (i=1;i<=5;i++) { tot/=n[i]; j=k/tot; printf("%c",v[i][j]); k-=j*tot; } printf("\n");}int main(){ int T; scanf("%d",&T); while (T--) { if (!init()) { printf("NO\n"); continue; } solve(); }}
- uva1262 Password【解法一】
- uva1262 Password【解法二】
- UVa1262 - Password
- UVA1262——password
- Password Uva1262 KMP
- UVa1262 - Password(暴力枚举)
- 【数学】Password, ACM/ICPC Daejon 2010, UVa1262
- UVA1262
- UVa1262
- 10-8 uva1262密码
- 求和问题解法一
- bzoj2724 蒲公英【解法一】
- bzoj3277 串【解法一】
- bzoj3456 城市规划【解法一】
- 例题10-8 密码 UVa1262
- uva1262(编码与解码)
- 千内偶数解法一
- hdu1166 敌兵布阵【解法一】
- oracle 根据表查询涉及到的包、存储过程
- Hive的使用之控制台
- django之新建一个应用learn
- ubuntu16.04 intel_rapl : no valid rapl domains found in packge0
- 微信支付 统一下单body 传中文乱码解决办法
- uva1262 Password【解法一】
- listView中添加了headerView时,使用position的注意事项
- Libuv可用的工具集合
- C#4.0新特性之元组Tuple
- Leetcode: Letter Combinations of a Phone Number
- STM32关于串口发送缓冲的问题
- 1028. 人口普查(20)
- webview加载图片,图片超出屏幕宽度
- Dubbo源码分析(AccessLogFilter)