>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 double相关记录706条 . 查询时间(0.106 秒)
Macroscopic hydrogel fibers are highly desirable for smart textiles, but the fabrication of self-healable and super-tough covalent/physical double-network hydrogels is rarely reported. Herein, copolym...
Recently, hydrogels with adjustable mechanical properties have been developed for information security applications. However, the defects such as easy drying and inferior resistance to extreme tempera...
The ion-conductive nature of layered double hydroxides (LDHs) and poor dispersibility of graphene are considered to be vital problems that limit their applications in the field of metal protection. Th...
ATAXIA TELANGIECTASIA-MUTATED (ATM) protein has been well studied for its roles in the DNA damage response. However, its role in meiosis has not been fully explored. Here, we characterized the functio...
探讨“Double R”胰管空肠吻合在腹腔镜胰十二指肠切除(PD)术中的临床应用效果。方法 回顾性收集 2018 年 11 月至 2019 年 12 月期间重庆医科大学附属第一医院肝胆外科在腹腔镜 PD 术中应用“Double R”完成胰管空肠导管对黏膜吻合治疗的 20 例患者的临床病理资料,分析胰肠吻合时间、术后胰瘘发生率及其他并发症发生率、死亡率、住院时间等临床指标。
Optimized agronomic management improves nitrogen (N) use efficiency in crop production. However, limited information exists about the effect of improved agronomic practices on the N surplus in double ...
Blockchains such as bitcoin rely on reaching global consensus for the distributed ledger, and suffer from a well know scalability problem. We propose an algorithm which can avoid double spending in th...
Secure multiparty computation allows a set of mutually distrusting parties to securely compute a function of their private inputs, revealing only the output, even if some of the parties are corrupt. R...
SUM-ECBC (Yasuda, CT-RSA 2010) is the first beyond birthday bound (BBB) secure block cipher based deterministic MAC. After this work, some more BBB secure deterministic MACs have been proposed, namely...
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM)....
Signal is a famous secure messaging protocol used by billions of people, by virtue of many secure text messaging applications including Signal itself, WhatsApp, Facebook Messenger, Skype, and Google A...
Double-authentication preventing signatures (DAPS) are a variant of digital signatures which have received considerable attention recently (Derler et al. EuroS&P 2018, Poettering AfricaCrypt 2018). Th...
Currently, round complexity and communication complexity are two fundamental issues of secure multi-party computation (MPC) since all known schemes require communication for each multiplication operat...
A recent paper by Derler, Ramacher, and Slamanig (IEEE EuroS&P 2018) constructs double-authentication preventing signatures ("DAP signatures", a specific self-enforcement enabled variant of signatures...
Double-authentication-preventing signatures (DAPS) are signatures designed with the aim that signing two messages with an identical first part (called address) but different second parts (called paylo...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...