>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Exchange相关记录919条 . 查询时间(0.218 秒)
Inspired by biological camouflage strategy according to the surrounding environment, a facile method to fabricate state‐switchable cellulose hydrogels (fluid, brittle, and rigid hydrogel) driven by Ca...
Tall oil fatty acids (TOFA) are a byproduct from the Kraft pulping process, and they represent a renewable and inexpensive alternative with high potential as a renewable feedstock. Epoxidized TOFA hav...
The widely used theory for gas exchange proposed by von Caemmerer and Farquhar (vCF) integrates molar fluxes, mole fraction gradients and ternary effects but does not account for cuticular fluxes, for...
Alkaline anion exchange membrane fuel cell has fast cathode reactions and thus allows the use of low cost electrocatalysts. However, its practical application is hindered by the low hydroxide ion cond...
Stomata control the gas exchange of terrestrial plant leaves, and are therefore essential to plant growth and survival. We investigated gas exchange responses to vapor pressure deficit (VPD) in two gr...
The quest for accurate exchange-correlation functionals has long remained a grand challenge in density functional theory (DFT), as it describes the many-electron quantum mechanical behavior through a ...
Password-Authenticated Key Exchange (PAKE) is a method to establish cryptographic keys between two users sharing a low-entropy password. In its asymmetric version, one of the users acts as a server an...
A tropical version of Stickel’s key exchange protocol was suggested by Grigoriev and Sphilrain [2] and successfully attacked by Kotov and Ushakov [5]. We suggest some modifications of this scheme that...
Once algorithms for quantum-resistant key exchange and digital signature schemes are selected by standards bodies, adoption of post-quantum cryptography will depend on progress in integrating those al...
In this paper we give nearly-tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols which are extremely simple and efficient. Unli...
Oblivious transfer is one of the main pillars of modern cryptography and plays a major role as a building block for other more complex cryptographic primitives. In this work, we present an efficient a...
Key Exchange (KE) is, undoubtedly, one of the most used cryptographic primitives in practice. Its authenticated version, Authenticated Key Exchange (AKE), avoids man-in-the-middle-based attacks by pro...
In this paper we present exchange equivalence attacks which is a cryptanalytic attack technique suitable for SPN-like block cipher designs. Our new technique results in a secret-key chosen plaintext d...
Guard cells perceive external and internal stimuli and regulate stomatal conductance in plants. With the use of gas exchange analyzers, time-resolved stomatal conductance responses to light intensity,...
Key exchange protocols in the asymmetric-key setting are known to provide stronger security properties than protocols in symmetric-key cryptography. In particular, they can provide perfect forward sec...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...