搜索结果: 1-15 共查到“知识库 Layer”相关记录950条 . 查询时间(0.082 秒)
Layer-by-layer assembly of nanomultilayer structures: Reinforcement of expanded char reduced the toxicity and fire hazard of epoxy resins
Epoxy resin Fire safety Intumescent flame retardant Smoke suppression Flame retardancy
2023/11/16
Epoxy resins (EP) have been widely applied in chemical engineering, composite materials, and aerospace. Nevertheless, the high fire hazard of flammable epoxy resins, which release considerable hazardo...
A high-precision method evaluating color quality of Sichuan Dark Tea based on colorimeter combined with multi-layer perceptron
high-precision method evaluating color Sichuan Dark Tea colorimeter multi-layer perceptron
2024/7/30
Instrumental examination of Sichuan Dark Tea (SDT) quality instead of human panel sensory evaluation is important for quality control. This study attempted to create a high-precision method to rapidly...
Experience shows that most researchers and developers tend to treat plain-domains (those that are not prefixed with “www” sub-domains, e.g. “example.com”) as synonyms for their equivalent www-domains ...
Optimizing Transport Layer for Secure Computation
Framework Transport layer Garbled circuits Implementation
2019/7/22
Transport layer: Although significantly improved, the performance of 2PC is still prohibitive for practical systems. Contrary to the common belief that bandwidth is the remaining bottleneck for 2PC im...
Afgjort -- A Semi-Synchronous Finality Layer for Blockchains
blockchain finality Byzantine agreement
2019/5/21
Most existing blockchains either rely on a Nakamoto-style of consensus, where the chain can fork and produce rollbacks, or on a committee-based Byzantine fault tolerant (CBFT) consensus, where no roll...
SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies
cryptographic protocols electronic commerce and payment blockchain
2019/4/3
Blockchain based systems, in particular cryptocurrencies, face a serious limitation: scalability. This holds, especially, in terms of number of transactions per second. Several alternatives are curren...
Spread: a new layer for profiled deep-learning side-channel attacks
Deep-learning Side-channel attacks Spread layer
2018/11/13
Recent publications, such as [10] and [13], exploit the advantages of deep-learning techniques in performing Side-Channel Attacks. One example of the Side-Channel community interest for such technique...
NOCUST - A Non-Custodial 2nd-Layer Financial Intermediary
2nd layer protocols blockchain scalability
2018/7/9
Bitcoin is meant to offer a payment system where the users are custodians of their funds instead of entrusting a trusted financial institution. The limited transaction throughput of such permissionles...
Partially specified channels: The TLS 1.3 record layer without elision
cryptographic standards TLS 1.3 stream-based channels
2018/7/2
This work advances the study of secure stream-based channels (Fischlin et al., CRYPTO ’15) by considering the multiplexing of many data streams over a single channel. This is an essential feature of r...
SEMI AUTOMATED LAND COVER LAYER UPDATING PROCESS UTILIZING SPECTRAL ANALYSIS AND GIS DATA FUSION
NTDB (National Topographic Data Base), Segmentation, Classification, nDSM, data fusion
2018/5/11
Technological improvements made in recent years of mass data gathering and analyzing, influenced the traditional methods of updating and forming of the national topographic database. It has brought a ...
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks
secure ranging physical layer security
2017/12/25
Physical layer attacks allow attackers to manipulate (spoof) ranging and positioning. These attacks had real world impact and allowed car thefts, executions of unauthorised payments and manipulation o...
Improvements to the Linear Layer of LowMC: A Faster Picnic
LowMC efficient implementation Picnic
2017/11/28
Picnic is a practical approach to digital signatures where the security is largely based on the existence of a one-way function, and the signature size strongly depends on the number of multiplication...
Security Analysis of ``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare''
Outsourcing Computation machine learning techniques
2017/5/12
With the synchronous development of both cloud computing and machine learning techniques, the clients are preferring to resort to the cloud server with substantial resources to train learning model. H...
Surface layer Nd isotopic composition of ferromanganese crusts collected from the Takuyo-Daigo Seamount reflects ambient seawater
ferromanganese (Fe-Mn) crust Nd isotopic composition seawater Takuyo-Daigo Seamount
2017/4/10
The neodymium (Nd) isotopic composition of the surface layers of eleven ferromanganese crust samples collected
from the Takuyo-Daigo Seamount (northwest Pacific Ocean) was determined. This is the fir...
Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer
Skinny block cipher Midori block cipher MILP
2017/3/6
In this paper, we propose an accurate security evaluation methodology for block ciphers with a binary diffusion layers against division cryptanalysis. We illustrate the division property by the indepe...