>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Resistant相关记录342条 . 查询时间(0.156 秒)
Low-melting point solder Sn-57Bi alloy nanoparticles were synthesized and encapsulated with abietic acid (aa) thin layer to form a core-shell structure. Formation of nanoparticle enhances its mechanic...
Researchers have developed a novel combination therapy using the anticancer agent mitoxantrone (MTX), together with an antibiotic, vancomycin, for treating bacteria that are resistant to the vancomyci...
The human heart beats more than two billion times in an average lifespan. The aorta’s tissue is strong enough to withstand this stress, yet flexible enough to maintain a steady flow of blood. But how ...
Researchers have found evidence for antibiotic resistance in the gut microbiomes of lemurs living close to humans. The more human contact they have, the more antibiotic resistance there is. Even capti...
Biological systems can harness living cells for growth and regeneration, but engineering systems cannot -- or couldn't until now.Qiming Wang and other researchers at the University of Southern Ca...
Chocolate-producing cacao trees that are resistant to a major pathogen were identified by an international team of plant geneticists. The NSF-funded finding points the way for plant breeders to develo...
A commitment scheme allows a committer to create a commitment to a secret value, and later may open and reveal the secret value in a verifiable manner. In the common reference string model, commitment...
Protection of intellectual property (IP) cores is one of the most practical security concern for modern integrated circuit (IC) industry. Albeit being well-studied from a practical perspective, the pr...
A traitor tracing scheme is a multi-user public-key encryption scheme where each user in the system holds a decryption key that is associated with the user's identity. Using the public key, a content ...
We propose a new nonce-misuse-resistant authenticated encryption scheme, which instantiates the SIV paradigm of Rogaway and Shrimpton. In contrast to the GCM-SIV approach proposed by Gueron and Lindel...
Seminal work by Juels, Catalano & Jakobsson delivered a verifiable, coercion-resistant voting system with quadratic complexity. This manuscript attempts to advance the state-of-the-art by delivering a...
The complexity of collision-resistant hash functions has been long studied in the theory of cryptography. While we often think about them as a Minicrypt primitive, black-box separations demonstrate th...
An emerging trend is for researchers to identify cryptography primitives for which feasibility was first established under obfuscation and then move the realization to a different setting. In this wor...
Cloud storage enables its users to store confidential information as encrypted files in the cloud. A cloud user (say Alice) can share her encrypted files with another user (say Bob) by availing proxy ...
Blocking microarchitectural (digital) side channels is one of the most pressing challenges in hardware security today. Recently, there has been a surge of effort that attempts to block these leakages ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...