>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Access相关记录490条 . 查询时间(0.246 秒)
【有机化学学术报告】Access Molecular Complexity by Breaking Symmetry of Dicarbonyl Compounds
HEARTS innovates to foster European access to space(图)     HEARTS  太空开发  高能重离子  辐射测试设施       font style='font-size:12px;'> 2023/5/26
The HEARTS project will provide two new radiation-testing facilities for space applications, one at CERN and one at GSI in Germany. The project started in January and will allow the testing of high-en...
Achieving equitable access to energy in a changing climate     energy access  climate change  economic development       font style='font-size:12px;'> 2021/8/6
Access to modern, reliable, and affordable energy services is a must for development and ensuring a decent quality of life. Researchers used a novel bottom-up approach to analyze how access to energy ...
山东大学计算机网络课件 Medium Access Control Sublayer。
近日,电气工程学院本科生吕润泽投至国际学术会议IEEE IECON 2020的研究论文“An LCC-type Bridgeless Continuous Input Current Charge Pump PFC Converter”获录用并将于10月中旬以口头报告形式参会。
A Blockchain-Based Access Control Scheme for Smart Grids     smart grids  access control  blockchain       font style='font-size:12px;'> 2019/8/2
At present, the access control schemes in the power grid are centralized. In the centralized system, the data of the network sensor nodes is transmitted by centralized nodes, and the data itself may b...
The contribution vector (convec) of a secret sharing scheme is the vector of all share sizes divided by the secret size. A measure on the convec (e.g., its maximum or average) is considered as a crite...
We study leakage-resilient continuously non-malleable secret sharing, as recently intro- duced by Faonio and Venturi (CRYPTO 2019). In this setting, an attacker can continuously tamper and leak from a...
The widespread use of cloud computing has enabled several database providers to store their data on servers in the cloud and answer queries from those servers. In order to protect the confidentiality ...
Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives used to hide the access pattern to data whose storage has been outsourced to an untrusted server. Unfo...
The techniques and methods to capture and represent in a three-dimensional digital space the shape of objects belonging to Cultural Heritage have become more widespread, regarding both the economic an...
A secret-sharing scheme allows some authorized sets of parties to reconstruct a secret; the collection of authorized sets is called the access structure. For over 30 years, it was known that any (mono...
近日,我校王文博教授指导的我校2014级博士生王硕发表的论文《A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications》被评为美国电气和电子工程师协会旗下期刊IEEE ACCESS 2017年最高引用论文(Most Cited Article of 2017)。
In this work we present a collection of compilers that take secret sharing schemes for an arbitrary access structures as input and produce either leakage-resilient or non-malleable secret sharing sche...
Organizational Cryptography for Access Control     public-key cryptography  elliptic curve cryptosystem       font style='font-size:12px;'> 2018/11/21
A cryptosystem for granting/rescinding access permission is proposed, based on elliptic curve cryptography. The `Organizational Cryptosystem' grants access permission not by giving secret (decription)...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...