>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Failures相关记录59条 . 查询时间(0.109 秒)
In this paper we investigate the impact of decryption failures on the chosen-ciphertext security of (Ring/Module)-Learning With Errors and (Ring/Module)-Learning with Rounding based primitives. Our an...
Nowadays it is well known that randomness may fail due to bugs or deliberate randomness subversion. As a result, the security of traditional public-key encryption (PKE) cannot be guaranteed any more. ...
We initiate the study of public-key encryption (PKE) secure against selective-opening attacks (SOA) in the presence of randomness failures, i.e., when the sender may (inadvertently) use low-quality r...
The SimpleMatrix encryption scheme as proposed by Tao et al. [16] is one of the very few existing approaches to create a secure and ef- ficient encryption scheme on the basis of multivariate polynom...
Instant messaging services are quickly becoming the most dominant form of communication among consumers around the world. Apple iMessage, for example, handles over 2 billion message each day, while Wh...
An authenticated encryption scheme is deemed secure (AE) if ciphertexts both look like random bitstrings and are unforgeable. AE is a much stronger notion than the traditional IND–CCA. One shortcomi...
In this paper, I propose a novel way to distinguish between agreement and cliticdoubling. The innovation lies in examining what happens when the relation between the relevant agreement-morphology and...
The paper presents a description of some point of view of different authors related to the failures and exceptions that appear in workflows, as a direct consequence of unavailability of resources invo...
This Carnegie Symposium celebrates a growing convergence of behavioral and neural approaches to the mechanisms of cognitive change and reflects an overall convergence of behavioral and neural approach...
The availability of powerful learning algorithms such as back-propagation has created a situation in which we now know how to teach neural networks many complex things. Models that use back propagatio...
Infants seem sensitive to hidden objects in habituation tasks at 3.5 months but fall to retrieve hidden objects until 8 months. The authors first consider principle-based accounts of these successes a...
In this paper, we apply a principal-orthogonal decomposition based method to the model reduction of a hybrid, nonlinear model of a power network. The results demonstrate that the sequence of fault eve...
Operational failures occur in all industries with consequences that range from minor inconveniences to major catastrophes. Many organizations have implemented incident reporting systems to highlight a...
This paper integrates theories of political budget cycles with theories of tactical electoral redistribution to test for political capture in a novel way. Studying banks in India, I find that governme...
AN INVERSE ANALYSIS OF UNOBSERVED TRIGGER FACTORS OF THE SLOPE FAILURES BASED ON STRUCTURAL EQUATION MODELING.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...