>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Selective相关记录293条 . 查询时间(0.093 秒)
The utilization of rosin to fabricate functional polymers has attracted great attention due to its unique structure and property. Herein, we prepared a new type of carboxyl-containing cross-linked ros...
Highly selective synthesis of renewable p-xylene (PX) from bio-based 2,5-dimethylfuran (DMF) and ethylene was successfully realized on H-Beta zeolite catalysts with further Al-modifications. The influ...
The Taiwan issue has always been a core national interest of mainland China, which has steadfastly vowed to fulfill national reunification. This book provides a comprehensive and updated explanation o...
New processing methods developed by MIT researchers could help ease looming shortages of the essential metals that power everything from phones to automotive batteries, by making it easier to separate...
How people fish matters as much as the quantity they’ve harvested, say University of Maine researchers Kara Pellowe and Heather Leslie.Their study in Ecosphere details the impacts of size-selective fi...
Smart materials are highly desirable over the recent decade due to the growing demand of complicated nature. Stable stimuli-responsive smart materials exhibit widespread potential for applications in ...
Group signatures allow members of a group to anonymously produce signatures on behalf of the group. They are an important building block for privacy-enhancing applications, e.g., enabling user data to...
Fish are a rich source of omega-3 polyunsaturated fatty acids (n-3 PUFAs) and thus, they should be an integral part of human diet at least twice a week. As a result, high attention has been devoted to...
In the situation where there are one sender and multiple receivers, a receiver selective opening (RSO) attack for a public key encryption (PKE) scheme considers adversaries that can corrupt some of th...
Security against selective opening attack (SOA) for receivers requires that in a multi-user setting, even if an adversary has access to all ciphertexts, and adaptively corrupts some fraction of the us...
We construct two identity-based encryption (IBE) schemes. The first one is IBE satisfying key dependent message (KDM) security for user secret keys. The second one is IBE satisfying simulation-based r...
Starting with any selectively secure identity-based encryption (IBE) scheme, we give generic constructions of fully secure IBE and selectively secure hierarchical IBE (HIBE) schemes. Our HIBE scheme a...
Selective opening (SO) security refers to adversaries that receive a number of ciphertexts and, after having corrupted a subset of the senders (thus obtaining the plaintexts and the senders' random co...
Change detection scheme based on guided contrasting was previously proposed. Guided contrasting filter takes two images (test and sample) as input and forms the output as filtered version of test imag...
The confidentiality notion of security against selective opening attacks considers adversaries that obtain challenge ciphertexts and are allowed to adaptively open them, thereby revealing the encryp...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...