派博傳思國際中心

標(biāo)題: Titlebook: High Performance Structural Materials; Proceedings of Chine Yafang Han Conference proceedings 2018 Springer Nature Singapore Pte Ltd. 2018 [打印本頁]

作者: 萌芽的心    時(shí)間: 2025-3-21 17:33
書目名稱High Performance Structural Materials影響因子(影響力)




書目名稱High Performance Structural Materials影響因子(影響力)學(xué)科排名




書目名稱High Performance Structural Materials網(wǎng)絡(luò)公開度




書目名稱High Performance Structural Materials網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱High Performance Structural Materials被引頻次




書目名稱High Performance Structural Materials被引頻次學(xué)科排名




書目名稱High Performance Structural Materials年度引用




書目名稱High Performance Structural Materials年度引用學(xué)科排名




書目名稱High Performance Structural Materials讀者反饋




書目名稱High Performance Structural Materials讀者反饋學(xué)科排名





作者: dictator    時(shí)間: 2025-3-21 21:50

作者: excrete    時(shí)間: 2025-3-22 03:34
in providers’ TR-069 deployments. Our setup consists of inexpensive hardware sensors deployed on customer premises and centralized log collectors. We perform real-world measurements and find that the purported security benefits of TR-069 are not realized as providers’ firmware update processes are
作者: 向下五度才偏    時(shí)間: 2025-3-22 04:41
Feng Chen,Zhiqiao Yan,Tao Wangion. The server checks (.) if the photos contain the user’s camera fingerprint (used to authenticate the pre-registered device) and (.) if the photos contain the embedded probe signal..If an adversary tries to remove (subtract) his own camera fingerprint and replace it with the victim’s camera finge
作者: 下邊深陷    時(shí)間: 2025-3-22 12:47
Yumei Jia,Yongjin Feng,Jianli Zhang,Pingping Liu,Qian Zhan,Farong Wanted twice. Thus, there was no composable and nonmalleable point function to instantiate the real-or-random construction..Our primary contribution is a nonmalleable point obfuscator that can be composed any polynomial number of times with the same point (which must be known ahead of time). Security r
作者: Exclude    時(shí)間: 2025-3-22 16:27

作者: 圣歌    時(shí)間: 2025-3-22 17:21
Mingyue Zheng,Shaoming Zhang,Jun Xu,Jinhui Zhang,Qiang Hu,Huijun He,Xinming Zhaovices belong to a single user can be exploited to build more efficient solutions..In this paper, we propose a Multi-Device Instant Messaging protocol based on Signal, ensuring all the security properties of the original Signal.
作者: Inferior    時(shí)間: 2025-3-22 22:02
Xin Li,Wei Wang,Hui Huang,Xiaoli Liu,Yifei Liu,Hongbo Wang,Shengping Wen,Xiaolan Wu,Kunyuan Gao,Zuorble with any key pair that is secure under the Uber assumption (EUROCRYPT 2004)..To demonstrate the extensive range of our general approach, we construct ARKG schemes for a number of popular pairing-based primitives: Boneh-Lynn-Shacham (JoC 2004), Camenisch-Lysyanskaya (CRYPTO 2004), Pointcheval-San
作者: WITH    時(shí)間: 2025-3-23 01:54

作者: 搖擺    時(shí)間: 2025-3-23 08:34

作者: STANT    時(shí)間: 2025-3-23 10:59

作者: 大溝    時(shí)間: 2025-3-23 14:00

作者: homeostasis    時(shí)間: 2025-3-23 19:17
Xiang Zhang,Hui Huang,Xiaoli Liu,Yifei Liu,Hongbo Wang,Shengping Wen,Kunyuan Gao,Xiaolan Wu can therefore, as we show, be used to argue about the security of different existing constructions following different design paradigms. Our definitions are stringent and when possible incorporate protection against maliciously chosen keys. In the process, we identify a subtle issue inherent to one
作者: FIS    時(shí)間: 2025-3-24 00:38
Yuna Wu,Hengcheng Liao,Jianfeng Zhangre hash function .′ from a given cascade-based hash function . for various cryptographic applications, such as collision-resistance, one-wayness, pseudorandomness, etc. We require each proposed construction of .′ to satisfy the following “axioms”..We discuss several popular modes of operation satisf
作者: BANAL    時(shí)間: 2025-3-24 05:46
Guohui Shi,Yong’an Zhang,Xiwu Li,Zhihui Li,Shuhui Huang,Lizhen Yan,Hongwei Yan,Hongwei Liu detection in IoT devices. ProvIoT applies federated learning techniques to overcome data and privacy limitations while minimizing network overhead. Infrequent on-device training of the local model requires less than 10% CPU overhead; syncing with the global models requires sending and receiving .2M
作者: 小卒    時(shí)間: 2025-3-24 07:06
Xiaofei Wang,Zuoren Nie,Hui Huang,Shengping Wen,Kunyuan Gao,Xiaolan Wul, NoSQL injection, and denial of service (DoS). The vulnerabilities have root causes of different natures. While BigBlueButton has a lot of complexity due to many components, eduMEET, which is relatively young, focuses more on features than security. The sheer amount of results and the lack of prio
作者: 大笑    時(shí)間: 2025-3-24 14:38
Effects of Internal Oxidation Methods on Microstructures and Properties of Al2O3 Dispersion-Strengtains as well as at the grain boundaries. While in the step-by-step alloy, the copper oxides mainly distribute at the grain boundaries. The step-by-step method improves electrical conductivity and ductility, but lowers hardness and strength. The integrated alloy has worse ductility and lower electric
作者: 和平主義者    時(shí)間: 2025-3-24 15:25

作者: magenta    時(shí)間: 2025-3-24 21:40
Preparation and Characterization of Fine 316L Stainless Steel Powders Prepared by Gas Atomization,re lesser when the pressure is greater. The flowability of the 316L stainless steel powders prepared by lower pressure were better, while the powders prepared by the higher pressure have extremely poor fluidity. The fluidity was significantly improved after sieving the fine powders less than 25?μm.
作者: GRILL    時(shí)間: 2025-3-24 23:19
Microstructure and Mechanical Properties of 1.2709 Die Steel by Selective Laser Melting,carbide particles, but the SLM process consisted of a uniformly distributed elongated martensite structure. In the region of different forming process, there was a transition region with a width of 40?μm. The transition zone was relatively loose and the defects were relatively more. The microstructu
作者: Matrimony    時(shí)間: 2025-3-25 03:42

作者: 陳列    時(shí)間: 2025-3-25 10:43

作者: 尖叫    時(shí)間: 2025-3-25 12:15
Effect of Intermediate Annealing Temperature and Aging on the Mechanical Properties and Conductivite as-EDAD samples just go oppositely. The conductivity of the sample annealed at 300?°C reaches 57.1%IACS, which is about 3.3%IACS higher than that of the sample without annealing. The effect of aging (190?°C for 20?h) on the mechanical properties and conductivity of as-EDAD samples was also investi
作者: 薄膜    時(shí)間: 2025-3-25 17:42

作者: Valves    時(shí)間: 2025-3-25 22:59

作者: 上坡    時(shí)間: 2025-3-26 04:12
Effects of Al Content on the Physical Properties of Al2O3 Dispersion-Strengthened Copper Alloys,hree dispersion-strengthened copper alloy powders with Al.O. content of 0.34, 1.00 and 3.19%, respectively, were prepared by internal oxidation using the optimal internal oxidation parameter. Hot pressing was subsequently adopted to prepare Al.O. dispersion-strengthened copper (Cu–Al.O.) alloys. The
作者: obsession    時(shí)間: 2025-3-26 04:45
Synthesis of Beryllium Pebbles Using Plasma Rotating Electrode Process,ket. From this point view, production methods and basic characteristics including particle morphology and mechanical properties of beryllium pebbles were investigated. The paper gives a brief description of fabrication technology for the Be pebbles. The Plasma Rotating Electrode Process (PREP) is th
作者: ovation    時(shí)間: 2025-3-26 09:15
Preparation and Characterization of Fine 316L Stainless Steel Powders Prepared by Gas Atomization,steel powders were prepared in nitrogen atmosphere by using self-designed nozzles. The fine powders yield, particle size distribution, particle shape and microstructure of powders prepared by different nozzles and different pressure were studied. Particle analyzer was used to characterize the powder
作者: 開始從未    時(shí)間: 2025-3-26 14:00

作者: insert    時(shí)間: 2025-3-26 19:51
A Comparative Corrosion Study on Traditional and Melt-Spinning 7075 Al Alloy,plasma sintering of the chopped melt-spun ribbons at different sintering temperatures. The corrosion behavior of the sintered 7075 alloy was examined and compared to that of the 7075-T6 bulk by electrochemical and immersion experiments carried out in NaCl solution. Microstructures of the consolidate
作者: 楓樹    時(shí)間: 2025-3-26 22:20
Preparation of Fe/Fe3O4 Soft Magnetic Composites by Spark Plasma Sintering,ce was improved. It solved the problem that hot pressing curing soft magnetic composites have low densification. The Fe/Fe.O. was observed at different sintering temperatures and the influence of the chemical composition and microstructure properties was analyzed. The material density was higher and
作者: Metamorphosis    時(shí)間: 2025-3-27 04:54
,High-Quality Ti–6Al–4V Alloy Powder Prepared by Plasma Rotating Electrode Process and Its Processibeved, three kinds of powder with different size distribution were consolidated by hot isostatic pressing (HIP). The phase compositions, morphologies and microstructures of the powders and HIPed samples were characterized. Mechanical properties of HIPed Ti–6Al–4V alloys also were investigated. The re
作者: 處理    時(shí)間: 2025-3-27 06:58
Microstructure and Mechanical Properties of Hot-Rolled 5E83 Alloy,at the temperatures varying from 200–470?°C. The microstructure of the hot-rolling plates was investigated using scanning electron microscopy and transmission electron microscopy. The results showed that the tensile strength and yield strength decreased with the rise of the hot-rolling temperature,
作者: monopoly    時(shí)間: 2025-3-27 09:43

作者: Fabric    時(shí)間: 2025-3-27 15:06

作者: 松軟無力    時(shí)間: 2025-3-27 19:35
Modeling and Simulation of Dynamic Recrystallization Behaviors of 7085 Aluminum Alloy During Hot Deare input to the CA model as important data. The hot deformation behavior was studied by means of a hot simulating test on Geleeble-1500 experiment machine. The range of thermal deformation temperature is 623–723?K, the range of strain rate is 0.001–1?s. and the maximum true strain is 0.91. Analysis
作者: 尊重    時(shí)間: 2025-3-27 23:08

作者: 磨坊    時(shí)間: 2025-3-28 03:06
,Homogenization Treatment and Kinetic Analysis of 2297 Al–Li Alloy,n were investigated by means of optical microscopy (OM), scanning electron microscopy (SEM), energy dispersive spectrometry (EDS) and differential scanning calorimetry (DSC). The results show that severe dendrite segregation exists in the as-cast alloy. Cu, Fe and Mn elements have obvious segregatio
作者: 擦掉    時(shí)間: 2025-3-28 09:56
,The Microstructure Evolution of Al–Mg–Si–Mn–Er–Zr Alloy During Homogenization,alloy, but homogenization heat treatment can effectively reduce these residual phases. Therefore, it is necessary to study the evolution of these non-equilibrium intermetallic phases during different homogenization treatment. In this study, the methods we used are OM, SEM in combination with EDS, XR
作者: 值得    時(shí)間: 2025-3-28 13:39
Effect of Intermediate Annealing Temperature and Aging on the Mechanical Properties and Conductivit.2Mg–0.35Si–0.3Ce wire rod, which experienced hot extrusion (named as E), cold drawing (named as D), annealing (named as A) and cold drawing, i.e. EDAD. And four intermediate annealing temperatures (150, 200, 250, 300?°C) were carried out for investigation. Microstructure observation shows that no r
作者: bile648    時(shí)間: 2025-3-28 17:29
,Quantitative Investigation of Precipitates in a High-Zinc Al–9.54Zn–2.10Mg–1.69Cu Alloy with Varioud T77 states are investigated via transmission electron microscopy (TEM) combined with high-resolution transmission electron microscopy (HRTEM) attached to it. Under the premise in precipitate observations, diameter distributions and average diameter size of precipitates are deduced from Bright-Fiel
作者: 分解    時(shí)間: 2025-3-28 19:21
,Flow Behaviors and Corresponding Constitutive Equation of the Al–9.4Zn–1.9Mg–2.0Cu Alloy, 0.001 to 10?s., and the deformation degree was 70%. Flow stress curves show that the flow stress decreases with the increasing deformation temperature and the decreasing strain rate. The measured flow stress was corrected because of the effect of friction. The corresponding corrected stress values
作者: 相信    時(shí)間: 2025-3-29 00:13

作者: NOCT    時(shí)間: 2025-3-29 03:23
no research has been published on the security and privacy aspects of TR-069. The first contribution of this paper is a study of the TR-069 ecosystem and techniques to inspect TR-069 communication. We find that the majority of analyzed providers do not use recommended security measures, such as TLS
作者: 訓(xùn)誡    時(shí)間: 2025-3-29 08:20

作者: 粉筆    時(shí)間: 2025-3-29 12:30

作者: Pulmonary-Veins    時(shí)間: 2025-3-29 15:54

作者: 越自我    時(shí)間: 2025-3-29 20:05

作者: ODIUM    時(shí)間: 2025-3-30 00:01
Mingyue Zheng,Shaoming Zhang,Jun Xu,Jinhui Zhang,Qiang Hu,Huijun He,Xinming Zhao them without losing time or security. However, most applications have been designed for single device usage. This is the case for secure instant messaging (SIM) services based on the Signal protocol, that implements the Double Ratchet key exchange algorithm. While some adaptations, like the Sesame
作者: 尖牙    時(shí)間: 2025-3-30 07:05

作者: degradation    時(shí)間: 2025-3-30 08:15

作者: OUTRE    時(shí)間: 2025-3-30 13:26

作者: FIR    時(shí)間: 2025-3-30 18:31
Xin Li,Wei Wang,Hui Huang,Xiaoli Liu,Yifei Liu,Hongbo Wang,Shengping Wen,Xiaolan Wu,Kunyuan Gao,Zuory be later computed by another intended party only. ARKG can be composed with standard public-key cryptosystems and has been used to construct a new class of privacy-preserving proxy signatures. The original construction of ARKG, however, generates discrete logarithm key pairs of the form ...In this
作者: Nebulous    時(shí)間: 2025-3-30 23:07

作者: 擦試不掉    時(shí)間: 2025-3-31 04:41
Liantao Ji,Wei Wang,Hui Huang,Shengping Wen,Kunyuan Gao,Xiaolan Wuernet. Anomaly detection is an effective way to detect intrusion, which can discover patterns that do not conform to expected behavior. The mainstream approaches of ADS (anomaly detection system) are using data mining technology to automatically extract normal pattern and abnormal ones from a large
作者: patriot    時(shí)間: 2025-3-31 07:22
Jie Zhang,Zhihui Li,Shuhui Huang,Xiwu Li,Lizhen Yan,Hongwei Yan,Hongwei Liu,Yongan Zhang,Baiqing Xiohes provide solutions of practical interest by weakening somewhat the fairness requirement. Such approaches fall roughly in three categories: “gradual release” schemes assume that the aggrieved party can eventually reconstruct the missing information; “optimistic schemes” assume a trusted third part
作者: 臭了生氣    時(shí)間: 2025-3-31 09:58
Peng Qi,Bolong Li,Wenjian Lv,Shasha Dong,Tongbo Wang,Ning Li,Zuoren Niehe . standard provides the . protocol for just this purpose. Its structure is generic, to be instantiated with a set of seven cryptographic algorithms. The currently-used proposal instantiates these by means of a set of .-based algorithms called .; as an alternative, the . committee submitted the .
作者: 發(fā)炎    時(shí)間: 2025-3-31 15:25
ShengLi Yang,Jian Shen,Peng Jiang,PeiYue Li,Yan Yu,DeJun Song,Huan Tao,Wei Guo,Wen Fuernet. Anomaly detection is an effective way to detect intrusion, which can discover patterns that do not conform to expected behavior. The mainstream approaches of ADS (anomaly detection system) are using data mining technology to automatically extract normal pattern and abnormal ones from a large
作者: inhumane    時(shí)間: 2025-3-31 17:37
Xiang Zhang,Hui Huang,Xiaoli Liu,Yifei Liu,Hongbo Wang,Shengping Wen,Kunyuan Gao,Xiaolan Wuow members of a group?to anonymously sign on behalf of the group. Membership is overseen by a designated group manager. There is also a tracing authority that can revoke anonymity by revealing the identity of the signer if and when needed, to enforce accountability and deter abuse. For the primitive
作者: 間諜活動(dòng)    時(shí)間: 2025-3-31 21:48

作者: jagged    時(shí)間: 2025-4-1 04:54

作者: 獸皮    時(shí)間: 2025-4-1 07:04

作者: TRUST    時(shí)間: 2025-4-1 11:28

作者: Substance-Abuse    時(shí)間: 2025-4-1 17:42

作者: Optometrist    時(shí)間: 2025-4-1 19:30
Zhiqiao Yan,Feng Chen,Tao Wangability of the Signal protocol. Our analysis shows that building a deniability proof for Signal is non-trivial and requires very strong assumptions on the underlying mathematical groups where the protocol is run.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
井研县| 台江县| 双鸭山市| 米易县| 盐边县| 淮安市| 阳高县| 普格县| 葫芦岛市| 元阳县| 阳原县| 张家界市| 白河县| 万全县| 新乡县| 仪陇县| 稻城县| 潼关县| 印江| 莱阳市| 社旗县| 田林县| 黄平县| 太康县| 青阳县| 辉南县| 海兴县| 新巴尔虎右旗| 台中市| 游戏| 喜德县| 义乌市| 德令哈市| 金秀| 南漳县| 西林县| 海原县| 车致| 萝北县| 宁明县| 同仁县|