搜索结果: 1-15 共查到“honey”相关记录55条 . 查询时间(0.125 秒)
Efficient MPC from Syndrome Decoding (or: Honey, I Shrunk the Keys)
multi-party computation oblivious transfer syndrome decoding
font style='font-size:12px;'>
2018/3/5
We present a new approach to designing concretely efficient MPC protocols with semi-honest security in the dishonest majority setting. Motivated by the fact that within the dishonest majority setting ...
Worldwide Importance of Honey Bees for Natural Habitats Captured in New Report(图)
Worldwide Importance Honey Bees Natural Habitats
font style='font-size:12px;'>
2018/1/31
An unprecedented study integrating data from around the globe has shown that honey bees are the world’s most important single species of pollinator in natural ecosystems and a key contributor to natur...
Honey bee research sets global market abuzz(图)
Honey bee sets global market abuzz
font style='font-size:12px;'>
2017/11/23
NSF-supported researchers mimicked the food foraging behavior of honey bees to vastly improve how computer programs and devices work together in a rapidly growing global market worth over $50 billion....
Honey Encryption for Language
Honey Encryption simple models
font style='font-size:12px;'>
2017/2/20
Honey Encryption (HE), introduced by Juels and Ristenpart (Eurocrypt 2014), is an encryption paradigm designed to produce ciphertexts yielding plausible-looking but bogus plaintexts upon decryption wi...
Visual Honey Encryption: Application to Steganography
Honey Encryption Steganography
font style='font-size:12px;'>
2017/2/20
Honey encryption (HE) is a new technique to overcome the weakness of conventional password-based encryption (PBE). However, conventional honey encryption still has the limitation that it works only fo...
Honey Chatting: A novel instant messaging system robust to eavesdropping over communication
Honey Encryption Language model
font style='font-size:12px;'>
2017/2/20
There have been many efforts to strengthen security of Instant Messaging (IM) system. One of the typical technologies is the conventional message encryption using a secret or private key. However, the...
Characterisation of phenolics and other quality parameters of different types of honey
physicochemical parameters phenolic acids flavonoids
font style='font-size:12px;'>
2016/7/6
In order to provide a general picture of phytochemical characteristics of nectar honey, honeydew, and mixed honeys, an overall comparison of physicochemical parameters, and phenolic profile as well as...
Phenolic content of honey reduces in vitro starch digestibility
functional food natural resources phytochemicals
font style='font-size:12px;'>
2016/7/6
The starch digestibility of foods containing honey, as a function of honey’s phenolic content was evaluated. We have evaluated the in vitro digestibility of starch from potato when added to honey. Nat...
Evaluation of Honey and Rice Syrup as Replacements for Sorbitol in the Production of Restructured Duck Jerky
Honey Rice Syrup Sorbitol Restructured Duck Jerky
font style='font-size:12px;'>
2016/5/19
The aim of this study was to evaluate the potential of natural humectants such as honey and rice syrup to replace sorbitol in the production of restructured duck jerky. Each humectant was mixed at 3%,...
The Honey Badger of BFT Protocols
broadcast distributed cryptography
font style='font-size:12px;'>
2016/2/25
The surprising success of cryptocurrencies has led to a surge of interest in deploying large scale, highly robust, Byzantine fault tolerant (BFT) proto- cols for mission-critical applications, such as...
Honey Encryption Beyond Message Recovery Security
secret-key cryptography HE
font style='font-size:12px;'>
2016/2/24
Juels and Ristenpart introduced honey encryption (HE) and showed how to achieve message
recovery security even in the face of attacks that can exhaustively try all likely keys. This is
important in ...
Honey Encryption: Security Beyond the Brute-Force Bound
Brute-Force Bound high min-entropy keys
font style='font-size:12px;'>
2016/1/25
We introduce honey encryption (HE), a simple, general approach to encrypting messages using low min-entropy
keys such as passwords. HE is designed to produce a ciphertext which, when decrypted with a...
Honey and Radiation-Induced Stomatitis in Patients With Head and Neck Cancer
Head and Neck Neoplasm Honey Mouth Stomatitis Radiotherapy
font style='font-size:12px;'>
2015/11/9
Background: Stomatitis is a common oral complication which affects 100% of patients undergoing head and neck radiotherapy. Acute stomatitis might cause failure and delay radiotherapy. Attention to mou...
Wimps or warriors?Honey bee larvae absorb the social culture of the hive,study finds
Wimps warriors Honey bee larvae social culture the hive
font style='font-size:12px;'>
2015/11/12
Even as larvae, honey bees are tuned in to the social culture of the hive, becoming more or less aggressive depending on who raises them, researchers report in the journal Scientific Reports.“We are i...
Influence of Saccharomyces cerevisiae strain on the profile of volatile organic compounds of blossom honey mead
honeywine yeast sensory profile
font style='font-size:12px;'>
2015/7/28
The influence of yeast strain on the volatile profile of meads fermented from blossom honey using three different Saccharomyces cerevisiae var. bayanus strains was evaluated. Meads were analysed by me...