>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Symmetric相关记录488条 . 查询时间(0.125 秒)
In this talk, I will present our recent result the 2D radially symmetric compressible Navier-Stokes equations with density-dependent viscosity. Under the condition of beta>1, we prove the global exist...
In this talk, I will present our recent result the 2D radially symmetric compressible MHD with density-dependent viscosity. Under the condition of beta>1, we prove the global existence of the radially...
we present a joint work with Clemens Weiske and Genkai Zhang (Sweden). It shows a branching law for compact symmetric pairs K\subset G of quaternionic type. Precisely to say, K is a product of a simpl...
Nearly holomorphic functions on symmetric domains are defined by Shimura as polynomial of differential of Kaehler potential with holomorphic coefficients. We find the corresponding Bergman reproducing...
Nearly holomorphic functions on symmetric domains are defined by Shimura as polynomial of differential of Kaehler potential with holomorphic coefficients. We find the corresponding Bergman reproducing...
Wan and Zhang have recently obtained a nontrivial lower bound for the number of zeros of complete symmetric polynomials over finite fields, and proposed a problem whether their bound can be improved. ...
Dynamic Searchable Symmetric Encryption (DSSE) enables a client to perform updates and searches on encrypted data which makes it very useful in practice. To protect DSSE from the leakage of updates (l...
We study the security of symmetric primitives against key-correlated attacks (KCA), whereby an adversary can arbitrarily correlate keys, messages, and ciphertexts. Security against KCA is required whe...
With the rise of the Internet of Things and the growing popularity of constrained end-devices, several security protocols are widely deployed or strongly promoted (e.g., Sigfox, LoRaWAN, NB-IoT). Base...
Counting the Boolean functions having specific cryptographic features is an interesting problem in combinatorics and cryptography. Count of bent functions for more than eight variables is unexplored. ...
Symmetric Searchable encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data, in a way that the privacy of both the files and the search que...
We present a new efficient protocol for computing private set union (PSU). Here two semi-honest parties, each holding a dataset of known size (or of a known upper bound), wish to compute the union of ...
Secure cloud storage is considered as one of the most important issues that both businesses and end-users take into account before moving their private data to the cloud. Lately, we have seen some int...
Securely managing encrypted data on an untrusted party is a challenging problem that has motivated the study of a variety of cryptographic primitives. A special class of such primitives allows an untr...
With this work, we intend on demonstrating the need for improvements to the currently standardized AES family of cryptosystems, and provide a solution that meets the requirements of long-term security...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...