標題: Titlebook: Grimsehl Lehrbuch der Physik; Band 1 Mechanik · Ak W. Schallreuter,K. Altenburg Textbook 1977Latest edition Springer Fachmedien Wiesbaden 1 [打印本頁] 作者: dejected 時間: 2025-3-21 17:36
書目名稱Grimsehl Lehrbuch der Physik影響因子(影響力)
書目名稱Grimsehl Lehrbuch der Physik影響因子(影響力)學(xué)科排名
書目名稱Grimsehl Lehrbuch der Physik網(wǎng)絡(luò)公開度
書目名稱Grimsehl Lehrbuch der Physik網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Grimsehl Lehrbuch der Physik被引頻次
書目名稱Grimsehl Lehrbuch der Physik被引頻次學(xué)科排名
書目名稱Grimsehl Lehrbuch der Physik年度引用
書目名稱Grimsehl Lehrbuch der Physik年度引用學(xué)科排名
書目名稱Grimsehl Lehrbuch der Physik讀者反饋
書目名稱Grimsehl Lehrbuch der Physik讀者反饋學(xué)科排名
作者: reserve 時間: 2025-3-21 20:39 作者: insipid 時間: 2025-3-22 04:10 作者: 我還要背著他 時間: 2025-3-22 06:12 作者: 調(diào)色板 時間: 2025-3-22 10:43 作者: CODE 時間: 2025-3-22 14:44 作者: tariff 時間: 2025-3-22 20:12 作者: 合唱隊 時間: 2025-3-22 23:55
Akustik,n in Materie und die Lehre von den diese Wellen erregenden Schwingungen der K?rper. Früher beschr?nkte man sich im allgemeinen auf Schwingungen, die Tonempfindungen im Ohr hervorrufen, doch ist es heute üblich, auch solche Schwingungen zur Akustik zu rechnen, die zwar nicht mehr vom Ohr wahrgenommen作者: 具體 時間: 2025-3-23 02:36 作者: Devastate 時間: 2025-3-23 06:46
,Haupts?tze der Thermodynamik,ung der mechanischen Energie, denn er besagt: Wenn z. B. eine bestimmte Menge kinetischer Energie unter W?rmeentwicklung verschwindet, so tritt dafür eine ?quivalente W?rmeenergie auf. Die entstandene Energie ist der verschwundenen Energie an Gr??e gleich, da auch bei der umgekehrten Umwandlung die 作者: Obliterate 時間: 2025-3-23 13:00
,Molekulare Theorie der W?rme,stheorie), so müssen wir zur Deutung der mit W?rmezufuhr und W?rmeentzug verbundenen Naturerscheinungen unsere Vorstellungen wesentlich verfeinern und auf die Bausteine der K?rper, die Atome und Moleküle, zurückgehen.作者: 擺動 時間: 2025-3-23 16:28
orm distribution. However, in reality, we may only obtain some ‘weak’ random sources guaranteed with high unpredictability (e.g. biometric data, physical sources, and secrets with partial leakage). Formally, the security of cryptographic models is measured by the expectation of some function, called作者: 走路左晃右晃 時間: 2025-3-23 20:34
W. Schallreuter have recently attracted a lot of interest in the systems community. This is because, due to their extreme efficiency, they can be executed on low-cost devices such as sensors, where the use of the public-key cryptography is infeasible. We argue that the study of leakage resilience of such schemes i作者: 公共汽車 時間: 2025-3-23 22:12
W. Schallreuterd coordinated ways) by a computationally unbounded adversary. It is well known that some fundamental tasks in information-theoretic security, such as secure communication (perfectly secure message transmission)?[4], broadcast (a.k.a. Byzantine agreement)?[7], and secure multi-party computation?[1,2]作者: 擁護者 時間: 2025-3-24 05:39 作者: CHASE 時間: 2025-3-24 07:38
W. Schallreuter authenticated channel, possibly realized by the aid of a human, that connects the sender and the receiver who are otherwise connected through an insecure channel and do not have any shared key or public key infrastructure. A good example of such scenarios is pairing of devices in Bluetooth. Manual 作者: 機密 時間: 2025-3-24 11:36
W. Schallreuternt with unlimited computational power, in terms of information theory. However, the security of most systems, including public key cryptosystems, is based on complexity theoretic assumptions..In both cases there is an implicit notion of average-case analysis. In the case of conditional security, the作者: ETHER 時間: 2025-3-24 15:05
W. Schallreutere access control for handling entities who can use the data. . can partially provide such flexibility by specifying privileged receivers so that only they can decrypt a ciphertext. However, once privileged receivers are specified, they can be no longer dynamically added and/or removed. In this paper作者: Optometrist 時間: 2025-3-24 20:56 作者: immunity 時間: 2025-3-25 02:53
W. Schallreutere access control for handling entities who can use the data. . can partially provide such flexibility by specifying privileged receivers so that only they can decrypt a ciphertext. However, once privileged receivers are specified, they can be no longer dynamically added and/or removed. In this paper作者: Pcos971 時間: 2025-3-25 05:13 作者: 銼屑 時間: 2025-3-25 09:46
W. Schallreutere access control for handling entities who can use the data. . can partially provide such flexibility by specifying privileged receivers so that only they can decrypt a ciphertext. However, once privileged receivers are specified, they can be no longer dynamically added and/or removed. In this paper作者: OWL 時間: 2025-3-25 14:13
W. Schallreuter who are allowed to submit (possibly forged) shares . observing shares of the honest users in the reconstruction phase. Towards this, we present four different schemes. Among these, first we present two .-out-of-. secret sharing schemes, the first one being capable of detecting . cheaters such that 作者: 不利 時間: 2025-3-25 16:29 作者: 值得尊敬 時間: 2025-3-25 21:01
W. Schallreutercial case of the computation of the . function over binary inputs in the secure channels model with a . broadcast channel. This simple function is a useful building block for other applications. The classical results in multiparty computation show that in this model, every function can be computed w作者: 東西 時間: 2025-3-26 00:41 作者: Flatus 時間: 2025-3-26 06:21 作者: 轉(zhuǎn)折點 時間: 2025-3-26 11:35
number of parties that can be under the control of a ... Our protocol privately communicates . bits and .s . bits to simultaneously share ??≥?1 elements from a finite field ., where . is the error parameter..There are only two known statistical AVSS protocols with .?=?3.?+?1, reported in [11] and [作者: 健忘癥 時間: 2025-3-26 13:59 作者: entice 時間: 2025-3-26 18:57 作者: forestry 時間: 2025-3-26 21:28
W. Schallreuterntine agreement with a low number of exceptions on several classes of graphs was considered, and more recently studied in?[6,8] with regards to secure multi-party computation..In this talk we review several protocols for the above tasks, and point out some interesting problems for future research.作者: Urologist 時間: 2025-3-27 03:49
W. Schallreuterery few participants, namely .?=?2,3, the proposed . (2,.)-threshold schemes have no pixel expansion! We prove that the above two cases are the only ones where it is possible to provide schemes without pixel expansion. That is, we prove that, in the . model, it is not possible to construct (2,.)-thr作者: overrule 時間: 2025-3-27 06:49 作者: CYT 時間: 2025-3-27 13:17
W. Schallreutero account the computational difficulty of extracting information. We present a new notion of security based on Kolmogorov complexity. The first goal is to provide a formal definition of what it means for an individual instance to be secure. The second goal is to bridge the gap between information th作者: 開玩笑 時間: 2025-3-27 16:15
W. Schallreutere when the ciphertext size is equal to the plaintext size. Our lower bounds can be applied to traditional broadcast encryption. We then construct a one-time secure RS-BE scheme with a trade-off between sizes of ciphertexts and secret keys, and our construction for the smallest ciphertext size meets 作者: 我還要背著他 時間: 2025-3-27 18:48 作者: OUTRE 時間: 2025-3-28 00:06
W. Schallreutere when the ciphertext size is equal to the plaintext size. Our lower bounds can be applied to traditional broadcast encryption. We then construct a one-time secure RS-BE scheme with a trade-off between sizes of ciphertexts and secret keys, and our construction for the smallest ciphertext size meets 作者: Irrepressible 時間: 2025-3-28 02:15 作者: 誘導(dǎo) 時間: 2025-3-28 08:16
W. Schallreutere when the ciphertext size is equal to the plaintext size. Our lower bounds can be applied to traditional broadcast encryption. We then construct a one-time secure RS-BE scheme with a trade-off between sizes of ciphertexts and secret keys, and our construction for the smallest ciphertext size meets 作者: outer-ear 時間: 2025-3-28 12:40 作者: 虛弱的神經(jīng) 時間: 2025-3-28 17:12
W. Schallreutercredential scheme by Camenisch and Lysyanskaya. Distributing the user party in such protocols has several practical advantages: First, the security of a user can be increased by sharing secrets and computations over multiple devices owned by the user. In this way, losing control of a single device d作者: 折磨 時間: 2025-3-28 21:17 作者: Critical 時間: 2025-3-28 23:01 作者: FATAL 時間: 2025-3-29 06:40 作者: 易于 時間: 2025-3-29 07:16 作者: Esalate 時間: 2025-3-29 15:07 作者: 討人喜歡 時間: 2025-3-29 15:57 作者: Coterminous 時間: 2025-3-29 22:28
,Molekulare Theorie der W?rme,stheorie), so müssen wir zur Deutung der mit W?rmezufuhr und W?rmeentzug verbundenen Naturerscheinungen unsere Vorstellungen wesentlich verfeinern und auf die Bausteine der K?rper, die Atome und Moleküle, zurückgehen.作者: Enliven 時間: 2025-3-30 01:29 作者: ERUPT 時間: 2025-3-30 06:08
Bewegungslehre (Kinematik oder Phoronomie),In diesem Abschnitt werden die in der Natur vorkommenden Bewegungen rein analytisch und geometrisch behandelt, ohne Rücksicht auf ihre physikalischen Ursachen und ihre Beziehungen zu den sie bedingenden Kr?ften.作者: 不確定 時間: 2025-3-30 08:58
Der Feinbau der Materie,Der atomare und molekulare Aufbau der Materie und die sich hieraus ergebenden Konsequenzen für das mikroskopische und makroskopische Verhalten der Materie werden in Bd. IV ausführlich behandelt. An dieser Stelle werden nur einige, vorwiegend qualitative Betrachtungen, die für ein Verst?ndnis der folgenden Abschnitte notwendig sind, angestellt.作者: Osteons 時間: 2025-3-30 15:28 作者: Efflorescent 時間: 2025-3-30 18:15 作者: Anguish 時間: 2025-3-30 21:56
978-3-663-05733-8Springer Fachmedien Wiesbaden 1977作者: dialect 時間: 2025-3-31 01:05
Overview: 978-3-663-05733-8978-3-663-05732-1