搜索结果: 1-15 共查到“知识库 Paper”相关记录215条 . 查询时间(0.062 秒)
Transparent and mechanically robust Polyvinyl-alcohol nanocomposites based on multiple cross-linked networks for paper-reinforcement Technology
PVA nanocomposites Multiple cross-linking network Boron-hydroxyl coordination Blocked diisocyanate Nano-SiO2
2023/12/1
Materials based on fiber-reinforced coating have gained increasing attention due to their environmental and industrial application tracks. Polyvinyl alcohol (PVA) composites with interpenetrating cros...
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
digital signatures hash functions public-key cryptography
2019/6/10
A new hash-based, server-supported digital signature scheme was proposed recently. We decompose the concept into forward-resistant tags and a generic cryptographic time-stamping service. Based on the ...
Comparing Teaching Methods on Skin Disorders Using Standardized Patients Dressed in Moulage vs Paper Cases
Comparing Teaching Methods
2018/11/22
Objective. To determine whether using standardized patients dressed in moulage improves pharmacy students’ ability to assess skin disorders compared to using picture-based paper cases. To determine ph...
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice
Bitcoin blockchain consensus
2018/1/27
The loosely defined terms hard fork and soft fork have established themselves as descriptors of different classes of upgrade mechanisms for the underlying consensus rules of (proof-of-work) blockchain...
Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper)
conditionally secure secret sharing secrecy computation
2017/7/28
Typically, when secrecy multiplication is performed in multiparty computation using Shamir’s (k,n) threshold secret sharing scheme, the result is a polynomial with degree of 2k-2 instead of k-1. This ...
关于ACCA Paper F8的持续经营假设复核,考生需要掌握以下内容:持续经营假设的含义、管理层的责任和审计师的责任、评价持续经营假设重大不确定性的指标、持续经营假设复核的审计程序、持续经营假设对审计报告的影响。
Two-dimensional root phenotyping system based on root growth on black filter paper and recirculation micro-irrigation
image analysis nutrient deficiency root system architecture
2016/7/6
Plant root system architecture (RSA) has an important role in crop production, particularly for water and nutrient uptake under limiting conditions. In the last few years, several root phenotyping met...
Pen and Paper Arguments for SIMON and SIMON-like Designs
SIMON Simeck differential cryptanalysis
2016/6/27
In this work, we analyze the resistance of \textsc{Simon}-like ciphers against differential attacks without using computer-aided methods. In this context, we first define the notion of a \textsc{Simon...
Screening of folate status with use of dried blood spots on filter paper
Dried blood spot DBS red cell folate
2016/6/1
Dried blood spots (DBS) on filter paper have been
a successful and economical matrix for neonatal screening.
Impact of a Paper vs Virtual Simulated Patient Case on Student-Perceived Confidence and Engagement
situated learning virtual, confi dence engagement patient case
2016/3/1
Objective. To evaluate online case simulation vs a paper case on student confidence and engagement.
Design. Students enrolled in a pharmacotherapy laboratory course completed a patient case sce...
How to manipulate curve standards: a white paper for the black hat
Elliptic-curve cryptography verifiably random curves verifiably pseudorandom curves
2016/1/8
This paper analyzes the cost of breaking ECC under the following assumptions: (1) ECC is using a standardized elliptic curve that was actually chosen by an attacker; (2) the attacker is aware of a vul...
Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots
Paper ballot Paper PUF Voting Integrity
2016/1/6
Abstract—Voting systems based on paper ballots has a long history with various problems. Vote-selling and correct outcome are two major problems among many. In this work, we propose a new solution to ...
The mission of theoretical cryptography is to define and construct provably secure cryptographic protocols and schemes. Without proofs of security, cryptographic constructs offer no guarantees whatsoe...
An appendix for a recent paper of Kim
discrete logarithm problem number field sieve pairings
2015/12/21
This note can be seen as an appendix of a recent paper of
Kim [Kim15]. We show that the discrete logarithm problem in fields FQ
where Q = p
n with p of medium size and n having a factor of the good...
Quality Detection and Control for Paper Chart Production & Updating Based on Standard Quality Database
Paper Chart Quality Detection Standard Quality Database Production and Updating
2015/10/12
The production and updating of paper chart is always the theme to the guarantee and improvement of hydrographic chart, in which
the quality detection and control is the key to consider. At present, ...