>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到presence相关记录435条 . 查询时间(0.078 秒)
It was suggested that Na+ ions could play a vital role in the growth of xero-halophyte Atriplex halimus. This study aims at investigating the impact of Na+ ions on the response of droughted A. halimus...
在这项研究中,我们对七个优良棉花品种的PAV模式进行了综合分析,发现大部分PAV小于20kb,小于40kb的PAV总共有1.27Gb,占到整个基因组的50.7%,大于40kb的PAV共有15430个,共有1.23Gb,占到整个基因组的49.3%。基因结构分析发现大部分缺失型PAV不在内含子区域或者外显子区域,说明这些PAV可能不对基因功能起直接作用。多倍性PAV主要定位在内含子区域,并且紧邻外显子...
Smart contracts allow for exchange of coins according to program rules. While it is well known that so called bribery contracts can influence the incentive mechanism of a Nakamotostyle consensus, we p...
Leakage during the signing process, including partial key exposure and partial (or complete) randomness leakage, may be devastating for the security of digital signatures. In this work, we consider th...
Key separation is often difficult to enforce in practice. While key reuse can be catastrophic for security, we know of a number of cryptographic schemes for which it is provably safe. But existing for...
In this work, we abstract some key ingredients in previous key exchange protocols based on LWE and its variants, by introducing and formalizing the building tool, referred to as key consensus (KC) and...
Masking provides a high level of resistance against side-channel analysis. However, in practice there are many possible pitfalls when masking schemes are applied, and implementation flaws are easily o...
We investigate the merits of altering the Garg, Gentry and Halevi (GGH13) graded encoding scheme to remove the presence of the ideal ⟨g⟩⟨g⟩. In particular, we show that we ...
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable properties for secure implementations of masking schemes. While tools exist to guarantee them separatel...
Rotational cryptanalysis is a statistical method for attacking ARX constructions. It was previously shown that ARX-C, i.e., ARX with the injection of constants can be used to implement any function. I...
We initiate the study of public-key encryption (PKE) secure against selective-opening attacks (SOA) in the presence of randomness failures, i.e., when the sender may (inadvertently) use low-quality r...
Botanical insecticides keep attracting more attention from environmental and small farmers worldwide as they are considered as a suitable alternative to synthetic insecticides. The use of secondary me...
This study was conducted to evaluate the occurrence of the genus Arcobacter in cats and dogs in the Czech Republic. These animals may be carriers of the bacteria and potential sources of human infecti...
The aim of this research is to investigate possibility for interactive semi-automatic interpretation of digital images in humanitarian demining for the purpose of detection and extraction of (strong) ...
The validity of the body mass index (BMI) as an indicator of the risk of becoming overweight and of the presence of overweight was evaluated in 6 groups of adolescents comprising several ethnic gro...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...