军事学 >>> 军事学
搜索结果: 1-12 共查到军事学 strategy相关记录12条 . 查询时间(0.125 秒)
Recent advances in cryptography promise to let us run complex algorithms in the encrypted domain. However, these results are still mostly theoretical since the running times are still much larger than...
With an historian’s keen eye for detail and nuance, John Lewis Gaddis surveys a variety of case studies from the Peloponnesian War to World War II in his new book On Grand Strategy, identifying in the...
Coercive U.S. strategies often feature the use of economic and financial sanctions to address national security threats. According to the most recent U.S. National Security Strategy, sanctions and oth...
Selfish mining is a well-known mining attack strategy discovered by Eyal and Sirer in 2014. After that, the attackers' strategy space has been extended by many works. These works only analyze the stra...
This article presents a secure mutual testing strategy for System-on-Chips (SoCs) that implement cryptographic functionalities. Such approach eliminates the need for an additional trusted component t...
We show how, when given an irreducible bivariate polynomial with coefficients in a finite prime field and an approximation to one of its roots, one can recover that root efficiently, if the approxim...
In almost any RFID system, a reader needs to identify, and optionally authenticate, a mul- titude of tags. If each tag has a unique secret, identification and authentication are trivial,however, the ...
Canetti, Goldreich, Goldwasser, and Micali (STOC 2000) introduced the notion of resettable zero-knowledge proofs, where the protocol must be zero-knowledge even if a cheating verifier can reset the ...
A successful strategy was identified for any Verifier colluding with any Issuer to distinguish honest Provers issuing DAA signatures. An additional verification equation was introduced for a Prover ...
An online algorithm is presented that produces an optimal radix-2 representation of an input integer n using digits from the set D`;u = fa 2 Z : `  a  ug, where `  0 and u  1. The algorithm work...
The end of the Cold War, which essentially meant the end of the United States and Soviet Union confrontation, has brought an unpredictable international order. This transformation has caused a change...
In face of challenges to its energy security, China has been making adjustments in its energy policy and energy development strategy since mid-1990s,and implementing a strategy for overseas energy dev...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...