نتایج جستجو برای: sensitive synthetic schemes zero

تعداد نتایج: 657628  

Journal: :Computers & Mathematics with Applications 2000

Journal: :Dalton transactions 2015
Sudarsan Tamang Kyungnam Kim Hyekyoung Choi Youngsik Kim Sohee Jeong

Indium antimonide (InSb), a narrow band gap III-V semiconductor is a promising infrared-active material for various optoelectronic applications. Synthetic challenge of colloidal InSb nanocrystals (NCs) lies in the limited choice of precursors. Only a few successful synthetic schemes involving highly toxic stibine (SbH3) or air- and moisture-sensitive metal silylamides (In[N(Si-(Me)3)2]3 or Sb[N...

Journal: :The Journal of the Acoustical Society of America 1989

Journal: :Wireless Communications and Mobile Computing 2023

In view of the problem that transaction privacy in current blockchain technology service is easy to be leaked, a bulletproof alliance chain protection mechanism proposed. Firstly, this paper uses digital certificates as access mechanisms and stores them on ensure identity technical transactions trusted. Secondly, data user hidden Pedersen commitment, Bulletproof used build scope proof. Enable v...

2007
Neil A. Dodgson Malcolm A. Sabin Richard Southern

Our objective is to create subdivision schemes with limit surfaces which are surfaces useful in engineering (spheres, cylinders, cones etc.) without resorting to special cases. The basic idea explored by Sabin et al. [1] in the curve case is that if the property that all vertices lie on an object of the required class can be preserved through the subdivision refinement, it will be preserved int...

Journal: :IACR Cryptology ePrint Archive 2010
Dima Grigoriev Vladimir Shpilrain

We propose a class of authentication schemes that are literally zeroknowledge, as compared to what is formally defined as “zero-knowledge” in cryptographic literature. We call this “no-leak” authentication to distinguish from an established “zero-knowledge” concept. The “no-leak” condition implies “zero-knowledge” (even “perfect zero-knowledge”), but it is actually stronger, as we illustrate by...

Journal: :CoRR 2015
Chong Huang Lalitha Sankar Anand D. Sarwate

Businesses (retailers) often wish to offer personalized advertisements (coupons) to individuals (consumers), but run the risk of strong reactions from consumers who want a customized shopping experience but feel their privacy has been violated. Existing models for privacy such as differential privacy or information theory try to quantify privacy risk but do not capture the subjective experience...

2015
Chong Huang Lalitha Sankar Anand D. Sarwate

Businesses (retailers) often wish to offer personalized advertisements (coupons) to individuals (consumers), but run the risk of strong reactions from consumers who want a customized shopping experience but feel their privacy has been violated. Existing models for privacy such as differential privacy or information theory try to quantify privacy risk but do not capture the subjective experience...

پایان نامه :دانشگاه تربیت معلم - سبزوار - دانشکده ریاضی و کامپیوتر 1392

در این پایان نامه ما، گراف کلاس های هم ارزی مقسوم علیه های صفر یک حلقه جابجایی r را مطالعه می کنیم. در ادامه چگونگی دریافت اطلاعاتی درباره حلقه r از این ساختار را نشان می دهیم. به ویژه چگونگی شناسایی اول وابسته های حلقه r را به کمک گراف کلاس های هم ارزی مقسوم علیه های صفر آن تعیین می کنیم. ایده اصلی این پایان نامه از مقاله s. spiroff, c. wickham, a zero divisor graph determind by equivalence...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید