>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-12 共查到flaws相关记录12条 . 查询时间(0.046 秒)
In this paper, we point out flaws in an existing verifiably multiplicative secret sharing (VMSS) scheme. Namely, we show that a scheme proposed by Yoshida and Obana presented at ICITS 2017 is insecure...
With backing from some of the largest technology companies, a major project called RISC-V seeks to facilitate open-source design for computer chips, offering the possibility of opening chip designs be...
New England’s wholesale electricity market has been in operation, since May 1, 1999. When the market began it was understood that the rules were not perfect (Cramton and Wilson 1998). However, it ...
To make cars as safe as possible, we crash them into walls to pinpoint weaknesses and better protect people who use them.That’s the idea behind aseries of experimentsconducted by a University of Washi...
Uinversity of Illinois at Chicago researchers have discovered a way to create a highly sensitive chemical sensor based on the crystalline flaws in graphene sheets. The imperfections have unique electr...
Recently, Yoon et al. proposed an efficient biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) for multi-server communication e...
Recently, Yoon et al. proposed an efficient biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) for multi-server communication e...
A quantitative procedure based on the magnetic flux leakage technique was proposed to evaluate the size of metal-loss type flaws such as corrosion pits in oil storage tank bottom floors. The approach...
Dutta and Mukhopadhyay have recently proposed some very efficient self- healing key distribution schemes with revocation. The parameters of these schemes contradict some results (lower bounds) prese...
In resent years, Popescu proposed several group signature schemes based on the Okamoto-Shiraishi assumption in [8{11], and claimed his schemes are secure. However, this paper demonstrates that these...
Deng and Zhao recently proposed a group signature scheme in [1].We find that the scheme cannot satisfy all of the requirements of a secure group signature.Keywords group signature scheme, bilinear pai...
A key agreement protocol is designed for two or more entities to agree upon a shared secret key, which is used to preserve confidentiality and data integrity over an open network. In 2007, Oh et al...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...