理学 >>> 数学 信息科学与系统科学 物理学 化学 天文学 地球科学总论 大气科学 地球物理学 地理学 地质学 水文学 海洋科学 生物学 科学技术史
搜索结果: 1-15 共查到理学 Attack相关记录16条 . 查询时间(0.125 秒)
The dining time of different insects impacts a plant's defenses and nutritional quality -- a complexity uncovered in new research with implications for pest management strategies.
Magnetic nanoparticle clusters have the power to punch through biofilms to reach bacteria that can foul water treatment systems, according to scientists at Rice University and the University of Scienc...
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone ...
This file contains examples of the generalized quantum permanent compromise attack to the Blum- Micali construction. The examples presented here illustrate the attack described in the paper published...
Wiesner's quantum money [5] is a simple, information-theoretically secure quantum cryptographic protocol. In his protocol, a mint issues quantum bills and anyone can query the mint to authenticate a ...
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key d...
Although the protocols used for quantum key distribution (QKD) have been proven to be unconditionally secret, the security of actual hardware depends critically on the detail of their implementation. ...
We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanch...
A mesocosm experiment was conducted to determine the effects of nutrient enrichment on competitive interactions between a hard coral, a green alga, and a sea anemone. In the low-nutrient controls, ab...
We examine a situation that $n$ eavesdroppers attack the Bennett-Brassard cryptographic protocol via their own optimal and symmetric strategies. Information gain and mutual information with sender for...
2006Vol.45No.4pp.765-768DOI: Detrended Fluctuation Analysis on Correlations of Complex Networks Under Attack and Repair Strategy CHI Li-Ping, YANG Chun-Bin, MA Ke, and CAI Xu ...
专著信息 书名 Effects of alpha fetoprotein on escape of Bel 7402 cells from attack of lymphocytes. 语种 英文 撰写或编译 作者 Mengsen Li,Xinhua Liu,Sheng Zhou,Pingfeng Li,Gang Li 第一作者单位 出版社 BMC Cancer 2005, 5:96? (Sep ...
March 16, 2007,UPTON, NY - Scientists at the U.S. Department of Energy’s Brookhaven National Laboratory have adapted radiotracer tools and imaging techniques pioneered at Brookhaven for medical scienc...
February 10, 2007,ONDON - The devastating impact of a terrorist attack in Britain using bioweapons or radioactivity could be further amplified by the panicked reaction and "alarmist media," a leading ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...