>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Design And Analysis相关记录27条 . 查询时间(0.163 秒)
Secure block cipher design is a complex discipline which combines mathematics, engineering, and computer science. In order to develop cryptographers who are grounded in all three disciplines, it is ne...
IUTAM Symposium on Mechanical design and analysis for AM technologies (AMT 2018).
We discuss the design rationale and analysis of the SIMON and SPECK lightweight block ciphers.
Wee (TCC'14) and Attrapadung (Eurocrypt'14) introduced predicate and pair encodings, respectively, as a simple way to construct and analyze attribute-based encryption schemes, or more generally predic...
Key predistribution schemes for resource-constrained networks are methods for allocating symmetric keys to devices in such a way as to provide an efficient trade-off between key storage, connectivity...
The authentication code (A-code) is the one of the most fundamental cryptographic protocols in information-theoretic cryptography, and it provides information-theoretic integrity or authenticity, i.e....
Mainly task of optimizing design of Industrial Photogrammetric Network with Variant Interior Elements (IPNVIE) is to provide a schema for a set of interior relatively problems in a photographic task....
A skywave signal is one has propagated by reflecting off the ionosphere. These signals are common in low frequency (LF) broadcast. However, in Loran, these signals are nuisances since they interfere w...
This paper presents an analysis of spinal codes, a class of rateless codes proposed recently. We prove that spinal codes achieve Shannon capacity for the binary symmetric channel (BSC) and the additiv...
Gravity dams are solid concrete structures that maintain their stability against design loads from the geometric shape, mass and strength of the concrete. The purposes of dam construction may include ...
Accountability is one of the most critical security properties of electronic payment protocols. It can be used to resolve disputes among involved parties. Several formal logics were proposed for reaso...
Accountability is one of the most critical security properties of electronic payment protocols. It can be used to resolve disputes among involved parties. Several formal logics were proposed for reaso...
Portable electronics is usually powered by battery, which is not sustainable not only to the longtime outdoor use but also to our living environment.
Geckolike robot (Geckobot), an important branch of bionic robotics, is a robot that simulates gecko’s capacity to climb walls and ceilings. The work environment of the traditional wallclimbing robot i...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...