نتایج جستجو برای: برهمکنشهایπ π
تعداد نتایج: 33229 فیلتر نتایج به سال:
I have searched for a CP violating asymmetry in the neutral charm meson decay of D -> π 0 π 0 π 0 . I present here a brief description of CP violation and the CLEO II.V detector, the methods used to conduct this search, and the initial measured branching ratio of the studied decay, as well as the initial measured asymmetry of the final state of the decay. Background information: Symmetries and ...
Untraceability and unreuseability are essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However, most of them have not been formally proved to be untraceable and unreuseable. In this paper we propose to use the applied pi calculus as a framework for describing and analyzing electronic cash protocols, and we analyze Fergu...
In this paper we design an e-voting protocol for an academic voting system which should be independent from other university applications. We briefly discuss security requirements for e-voting schemes focusing on our proposed scheme. We design a receipt-free e-voting protocol which requires neither anonymous channel nor other physical assumptions. We give a short survey on formal analysis of e-...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید