>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到amplification相关记录128条 . 查询时间(0.093 秒)
Plants have developed sophisticated mechanisms to survive in dynamic environments. Plants can communicate via volatile organic compounds (VOCs) to warn neighboring plants of threats. In most cases, VO...
To evaluate a reverse transcription loop-mediated isothermal amplification (RT-LAMP) assay for detection of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), and compare it with RT-PCR.
建立环介导等温扩增技术(loop-mediated isothermal amplificationLAMP)检测呼吸道感染患者痰液中肺炎克雷伯菌(Klebsiella pneumoniae,Kpn)的方法并进行初步应用。 方法:基于Kpn phoE基因设计4条特异性引物,对反应条件中的Mg2+和甜菜碱浓度进行优化,建立检测Kpn LAMP方法并进行特异性和灵敏度试验;收集308例呼吸道感染患...
We develop novel techniques to leverage the use of leakage simulation lemma (Jetchev-Peitzrak TCC 2014) to argue amplification. A crucial component of our result is a new notion for secret sharing NPN...
The existence of secure indistinguishability obfuscators (iO) has far-reaching implications, significantly expanding the scope of problems amenable to cryptographic study. All known approaches to cons...
The era of PUFs has been characterized by the efforts put into research and the development of PUFs that are robust against attacks, in particular, machine learning (ML) attacks. In the lack of system...
privacy amplification, two mutually trusted parties aim to amplify the secrecy of an initial shared secret X in order to establish a shared private key K by exchanging messages over an insecure commun...
Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-quantum scenario. In particular, the MDPC scheme is a basic scheme from which many other schemes have ...
In this paper, we connect two interesting problems in the domain of Information-Theoretic Cryptography: "Non-malleable Codes" and "Privacy Amplification". Non-malleable codes allow for encoding a mess...
西北大学汉译英课件 Amplification
In the \emph{conditional disclosure of secrets} problem (Gertner et al., J. Comput. Syst. Sci., 2000) Alice and Bob, who hold inputs xx and yy respectively, wish to release a common secret ss to Carol...
We present a general notion of channel for cryptographic purposes, which can model either a (classical) physical channel or the consequences of a cryptographic protocol, or any hybrid. We consider {\e...
Security against hardware trojans is currently becoming an essential ingredient to ensure trust in information systems. A variety of solutions have been introduced to reach this goal, ranging from rea...
Erasable memory is an important resource for designing practical cryptographic protocols that are secure against adaptive attacks. Many practical memory devices such as solid state drives, hard disks,...
Background: The incidence rate of gastric cancer in western countries has shown a remarkable decline in the recent years while it is still the most common cancer among males in Iran. The proto-oncogen...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...