搜索结果: 1-15 共查到“知识库 Selective”相关记录280条 . 查询时间(0.062 秒)
Rosin-derived porous microspheres with robust selective cationic dye adsorption
Adsorption Dyes Methylene blue Crystal violet Rosin Polymer microspheres
2023/12/15
The utilization of rosin to fabricate functional polymers has attracted great attention due to its unique structure and property. Herein, we prepared a new type of carboxyl-containing cross-linked ros...
Highly selective production of renewable p-xylene from bio-based2,5-dimethylfuran and ethylene over Al-modified H-Beta zeolites
p-xylene ethylene Al-modified H-Beta zeolites
2023/6/19
Highly selective synthesis of renewable p-xylene (PX) from bio-based 2,5-dimethylfuran (DMF) and ethylene was successfully realized on H-Beta zeolite catalysts with further Al-modifications. The influ...
X-ray and UV Dual Photochromism, Thermochromism, Electrochromism, and Amine-Selective Chemochromism in an Anderson-like Zn7 Cluster-Based 7-Fold Interpenetrated Framework(图)
Anderson Zn7簇 光致变色 热致变色 电致变色
2023/3/28
Smart materials are highly desirable over the recent decade due to the growing demand of complicated nature. Stable stimuli-responsive smart materials exhibit widespread potential for applications in ...
Group signatures allow members of a group to anonymously produce signatures on behalf of the group. They are an important building block for privacy-enhancing applications, e.g., enabling user data to...
Estimation of genetic parameters of fatty acids composition in flesh of market size common carp (Cyprinus carpio L.) and their relation to performance traits revealed that selective breeding can indirectly affect flesh quality
genetic correlations genetic improvement growth heritability slaughtering traits, supplemental feeding
2018/11/23
Fish are a rich source of omega-3 polyunsaturated fatty acids (n-3 PUFAs) and thus, they should be an integral part of human diet at least twice a week. As a result, high attention has been devoted to...
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions
public key encryption receiver selective opening security chosen ciphertext security
2018/11/12
In the situation where there are one sender and multiple receivers, a receiver selective opening (RSO) attack for a public key encryption (PKE) scheme considers adversaries that can corrupt some of th...
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks
simulation-based security selective opening security for receivers chosen-ciphertext attacks
2018/8/21
Security against selective opening attack (SOA) for receivers requires that in a multi-user setting, even if an adversary has access to all ciphertexts, and adaptively corrupts some fraction of the us...
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption
Identity-based encryption Key dependent message security Receiver selective opening security
2017/10/10
We construct two identity-based encryption (IBE) schemes. The first one is IBE satisfying key dependent message (KDM) security for user secret keys. The second one is IBE satisfying simulation-based r...
From Selective IBE to Full IBE and Selective HIBE
public key encryption identity-based encryption Hierarchical Identity-Based-Encryption
2017/9/30
Starting with any selectively secure identity-based encryption (IBE) scheme, we give generic constructions of fully secure IBE and selectively secure hierarchical IBE (HIBE) schemes. Our HIBE scheme a...
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE
LWE lossy trapdoor functions chosen-ciphertext security
2017/9/14
Selective opening (SO) security refers to adversaries that receive a number of ciphertexts and, after having corrupted a subset of the senders (thus obtaining the plaintexts and the senders' random co...
CHANGE DETECTION VIA SELECTIVE GUIDED CONTRASTING FILTERS
Change Detection Mathematical Morphology Guided filtering
2017/7/13
Change detection scheme based on guided contrasting was previously proposed. Guided contrasting filter takes two images (test and sample) as input and forms the output as filtered version of test imag...
Selective Opening Security from Simulatable Data Encapsulation
selective opening hybrid encryption mode of operation
2016/12/10
The confidentiality notion of security against selective opening attacks considers adversaries
that obtain challenge ciphertexts and are allowed to adaptively open them, thereby revealing
the encryp...
From Weakly Selective to Selective Security in Compact Functional Encryption
Functional Encryption Compactness Provable Security
2016/12/10
Functional Encryption (FE) generalizes the notion of traditional encryption system by providing finegrained
access control. In a functional encryption scheme, the owner of the secret key can generate...
Selective-Opening Security in the Presence of Randomness Failures
selective-opening security deterministic encryption nonce-based PKE
2016/12/9
We initiate the study of public-key encryption (PKE) secure against selective-opening attacks (SOA) in
the presence of randomness failures, i.e., when the sender may (inadvertently) use low-quality r...
Evaluation of effective gametocides for selective induction of male sterility in sorghum
chemical hybridizing agent ethrel ethyl 4-fluorooxanilate gametocide pollen sterility spikelet sterility Sorghum bicolor
2016/12/8
Effective gametocides can serve as alternative agents to induce male sterility in sorghum. The objectives of this study were to evaluate the effectiveness of selected male gametocides in sorghum, to d...