نتایج جستجو برای: sensitive synthetic schemes zero
تعداد نتایج: 657628 فیلتر نتایج به سال:
Indium antimonide (InSb), a narrow band gap III-V semiconductor is a promising infrared-active material for various optoelectronic applications. Synthetic challenge of colloidal InSb nanocrystals (NCs) lies in the limited choice of precursors. Only a few successful synthetic schemes involving highly toxic stibine (SbH3) or air- and moisture-sensitive metal silylamides (In[N(Si-(Me)3)2]3 or Sb[N...
In view of the problem that transaction privacy in current blockchain technology service is easy to be leaked, a bulletproof alliance chain protection mechanism proposed. Firstly, this paper uses digital certificates as access mechanisms and stores them on ensure identity technical transactions trusted. Secondly, data user hidden Pedersen commitment, Bulletproof used build scope proof. Enable v...
Our objective is to create subdivision schemes with limit surfaces which are surfaces useful in engineering (spheres, cylinders, cones etc.) without resorting to special cases. The basic idea explored by Sabin et al. [1] in the curve case is that if the property that all vertices lie on an object of the required class can be preserved through the subdivision refinement, it will be preserved int...
We propose a class of authentication schemes that are literally zeroknowledge, as compared to what is formally defined as “zero-knowledge” in cryptographic literature. We call this “no-leak” authentication to distinguish from an established “zero-knowledge” concept. The “no-leak” condition implies “zero-knowledge” (even “perfect zero-knowledge”), but it is actually stronger, as we illustrate by...
Businesses (retailers) often wish to offer personalized advertisements (coupons) to individuals (consumers), but run the risk of strong reactions from consumers who want a customized shopping experience but feel their privacy has been violated. Existing models for privacy such as differential privacy or information theory try to quantify privacy risk but do not capture the subjective experience...
Businesses (retailers) often wish to offer personalized advertisements (coupons) to individuals (consumers), but run the risk of strong reactions from consumers who want a customized shopping experience but feel their privacy has been violated. Existing models for privacy such as differential privacy or information theory try to quantify privacy risk but do not capture the subjective experience...
در این پایان نامه ما، گراف کلاس های هم ارزی مقسوم علیه های صفر یک حلقه جابجایی r را مطالعه می کنیم. در ادامه چگونگی دریافت اطلاعاتی درباره حلقه r از این ساختار را نشان می دهیم. به ویژه چگونگی شناسایی اول وابسته های حلقه r را به کمک گراف کلاس های هم ارزی مقسوم علیه های صفر آن تعیین می کنیم. ایده اصلی این پایان نامه از مقاله s. spiroff, c. wickham, a zero divisor graph determind by equivalence...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید