>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到share相关记录89条 . 查询时间(0.078 秒)
Installed nuclear capacity is set to more than triple by 2031, and nuclear power plants are likely to generate about 9% of the country's electricity by 2047, according to Minister of State Jitendra Si...
Scientists show that 'cool' stars like the sun share dynamic surface behaviors that influence their energetic and magnetic environments. Stellar magnetic activity is key to whether a given star can ho...
In recent years, scientists have uncovered evidence that Neanderthals and modern humans interbred. Previous research has shown that Neanderthals who were connected to the Vindija Cave in modern-day Cr...
Our conjecture emerges after introducing the notion of convec set for an access structure, a subset of nn-dimensional real space. We prove several topological properties about convec sets and raise se...
Bad choices of passwords were and are a pervasive problem. Most password alternatives (such as two-factor authentication) may increase cost and arguably hurt the usability of the system. This is of sp...
A new study finds that viruses share some genes exclusively with cells that are not their hosts. The study, reported in the journal Frontiers in Microbiology, adds to the evidence that viruses swap ge...
Bamboo specialization is one of the most extreme examples of convergent herbivory, yet it is unclear how this specific high-fiber diet might selectively shape the composition of the gut microbiome com...
A Florida Museum of Natural History study provides new insights into the complex, shared history between blood-sucking lice and the vitamin-producing bacterial sidekicks that enable them to parasitize...
We device a general secret sharing scheme for evolving access structures (following [KNY16]). Our scheme has (sub)exponentially smaller share complexity (share of ii'th party) for certain access struc...
In this work, we explore the possibilities for practical Threshold Implementation (TI) with only two shares in order for a smaller design that needs less randomness but is still first-order leakage re...
Coral reefs face many threats. Ocean acidification, algal takeover caused by overfishing and exploding populations of harmful microbes all jeopardize the health of the world’s most productive and dive...
Secret sharing schemes allow a dealer to distribute a secret piece of information among several parties so that any qualified subset of parties can reconstruct the secret, while every unqualified su...
This paper shows how several ring-LWE based key exchange protocols can be broken, under the assumption that the same key share is used for multiple exchanges. This indicates that, if these key excha...
An unfortunate reality for cybersecurity researchers is that real-world data for their research too often comes via a security breach. Now computer scientists have devised a way to let organizations s...
Sharing information to others is common nowadays, but the question is with whom to share. To address this problem, we propose the notion of secret transfer with access structure (STAS). STAS is a tw...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...