>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到randomization相关记录25条 . 查询时间(0.058 秒)
Indistinguishability obfuscation constructions based on matrix branching programs generally proceed in two steps: first apply Kilian's randomization of the matrix product computation, and then encode ...
Multi-user (mu) security considers large-scale attackers (e.g., state actors) that given access to a number of sessions, attempt to compromise {\em at least} one of them. Mu security of authenticated ...
Efficiently searchable and easily deployable encryption schemes enable an untrusted, legacy service such as a relational database engine to perform searches over encrypted data. The ease with which su...
Background: Observational studies have shown that higher body mass index (BMI) is associated with increased risk of developing disordered eating patterns. However, the causal direction of this relatio...
Linear cryptanalysis can be considered to be one of the strongest techniques in the cryptanalyst’s arsenal. In most cases, Matsui’s Algorithm 2 is used for the key recovery part of the attack. The s...
We read with great interest the excellent paper of Haycock et al. (1) on the design, analysis, and interpretation of Mendelian randomization (MR) studies. We agree with the authors’ conclusions that t...
shared random strings are either communicated or recreated algorithmically in “pseudomode, thereby exhibiting innate vulnerability. Proposing a secure protocol based on unshared randomized data, whi...
We revisit randomization of the prover in the GS proof system. We find an unnoticed bug in the ``optimized'' randomization in the symmetric bilinear setting with several assumptions, say, the DLIN ass...
Mendelian randomization (MR) is an increasingly important tool for appraising causality in observational epidemiology. The technique exploits the principle that genotypes are not generally susceptible...
Background: An understanding of whether homocysteine is a cause or a marker of increased blood pressure is relevant because blood homocysteine can be effectively lowered by safe and inexpensive interv...
From a theoretical perspective, cash balances are thought to play a role in common value auctions because of limited liability. However, they have also been found to be important in common value aucti...
Address-space randomization is a technique used to fortify systems against buffer overflow attacks. The idea is to introduce artificial diversity by randomizing the memory location of certain system c...
Gray codes for randomization procedurse.
In this paper we consider the problem of secret sharing where shares are encrypted using a public-key encryption (PKE) scheme and ciphertexts are publicly available. While intuition tells us that the ...
Aim: To compare the results from twelve minutes run test (12-MRT) when subjects run singly with those obtained when subjects run in randomized groups and in pre oriented groups. Methods: 33 subjects p...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...