搜索结果: 1-15 共查到“Access”相关记录490条 . 查询时间(0.246 秒)
【有机化学学术报告】Access Molecular Complexity by Breaking Symmetry of Dicarbonyl Compounds(图)
Molecular Complexity Breaking Symmetry Dicarbonyl Compounds
font style='font-size:12px;'>
2023/6/20
【有机化学学术报告】Access Molecular Complexity by Breaking Symmetry of Dicarbonyl Compounds
HEARTS innovates to foster European access to space(图)
HEARTS 太空开发 高能重离子 辐射测试设施
font style='font-size:12px;'>
2023/5/26
Achieving equitable access to energy in a changing climate
energy access climate change economic development
font style='font-size:12px;'>
2021/8/6
Access to modern, reliable, and affordable energy services is a must for development and ensuring a decent quality of life. Researchers used a novel bottom-up approach to analyze how access to energy ...
山东大学计算机网络课件 Medium Access Control Sublayer
山东大学 计算机网络 课件 Medium Access Control Sublayer
font style='font-size:12px;'>
2020/12/25
山东大学计算机网络课件 Medium Access Control Sublayer。
西南交通大学电气工程学院本科生吕润泽的论文分别获SCI收录刊IEEE ACCESS和国际会议IEEE IECON录用(图)
西南交通大学 电气工程学院 吕润泽 SCI IEEE ACCESS IEEE IECON
font style='font-size:12px;'>
2020/8/6
近日,电气工程学院本科生吕润泽投至国际学术会议IEEE IECON 2020的研究论文“An LCC-type Bridgeless Continuous Input Current Charge Pump PFC Converter”获录用并将于10月中旬以口头报告形式参会。
A Blockchain-Based Access Control Scheme for Smart Grids
smart grids access control blockchain
font style='font-size:12px;'>
2019/8/2
At present, the access control schemes in the power grid are centralized. In the centralized system, the data of the network sensor nodes is transmitted by centralized nodes, and the data itself may b...
A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio
secret sharing general access structures information ratio
font style='font-size:12px;'>
2019/6/3
The contribution vector (convec) of a secret sharing scheme is the vector of all share sizes divided by the secret size. A measure on the convec (e.g., its maximum or average) is considered as a crite...
Continuously Non-Malleable Secret Sharing for General Access Structures
Secret sharing Non-malleability Leakage resilience
font style='font-size:12px;'>
2019/6/3
We study leakage-resilient continuously non-malleable secret sharing, as recently intro- duced by Faonio and Venturi (CRYPTO 2019). In this setting, an attacker can continuously tamper and leak from a...
Full Database Reconstruction with Access and Search Pattern Leakage
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
font style='font-size:12px;'>
2019/4/22
The widespread use of cloud computing has enabled several database providers to store their data on servers in the cloud and answer queries from those servers. In order to protect the confidentiality ...
What Storage Access Privacy is Achievable with Small Overhead?
oblivious RAM differential privacy lower bounds
font style='font-size:12px;'>
2019/4/16
Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives used to hide the access pattern to data whose storage has been outsourced to an untrusted server. Unfo...
ACCESS AND WEB-SHARING OF 3D DIGITAL DOCUMEACCESS AND WEB-SHARING OF 3D DIGITAL DOCUMENTATION OF ENVIRONMENTAL AND ARCHITECTURAL HERITAGENTATION OF ENVIRONMENTAL AND ARCHITECTURAL HERITAGE
Cultural Heritage 3D documentation 3D surveying HBIM Valorisation
font style='font-size:12px;'>
2019/3/4
The techniques and methods to capture and represent in a three-dimensional digital space the shape of objects belonging to Cultural Heritage have become more widespread, regarding both the economic an...
Secret-Sharing Schemes for General and Uniform Access Structures
secret sharing conditional disclosure of secrets protocols private simultaneous messages protocols
font style='font-size:12px;'>
2019/3/4
A secret-sharing scheme allows some authorized sets of parties to reconstruct a secret; the collection of authorized sets is called the access structure. For over 30 years, it was known that any (mono...
北京邮电大学博士生论文被评为IEEE ACCESS 2017最高引用论文
北京邮电大学 博士生论文 为IEEE ACCESS 2017 最高引用论文 电子工程
font style='font-size:12px;'>
2019/1/28
近日,我校王文博教授指导的我校2014级博士生王硕发表的论文《A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications》被评为美国电气和电子工程师协会旗下期刊IEEE ACCESS 2017年最高引用论文(Most Cited Article of 2017)。
Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures
Non-malleable secret sharing Leakage-resilient secret sharing Non-malleable extractors
font style='font-size:12px;'>
2018/12/3
In this work we present a collection of compilers that take secret sharing schemes for an arbitrary access structures as input and produce either leakage-resilient or non-malleable secret sharing sche...
Organizational Cryptography for Access Control
public-key cryptography elliptic curve cryptosystem
font style='font-size:12px;'>
2018/11/21
A cryptosystem for granting/rescinding access permission is proposed, based on elliptic curve cryptography. The `Organizational Cryptosystem' grants access permission not by giving secret (decription)...