Creat membership Creat membership
Sign in

Forgot password?

Confirm
  • Forgot password?
    Sign Up
  • Confirm
    Sign In
home > search

Now showing items 65 - 80 of 19040

  • The Assassination of Brangwain Spurge by M. T. Anderson

    Jacques, Wesley  

    Download Collect
  • X-FEL Quadrupole with Gradient of 100 T/m

    Ivan Okunev   Ivan Morozov   Nikolay Nefedov  

    Abstract The paper describes an XFEL quadrupole with a gradient of 100 T/m. The magnets of this quadrupole are designed for installation in the free space between the XFEL undulators to maintain the high quality of the electron beam at an energy of 10 - 20 GeV, which requires high stability of the magnetic axis of the lens. The available size of the aperture of the lens is R = 8 mm. The stability of the quadrupole magnetic axis is better than 5 um for ±10% of the gradient range; the magnetic field quality is good (ΔВ/В < 10 -3 ).
    Download Collect
  • Apocalypse in Islam. By Jean-Pierre Filiu; translated by M. B. DeBevoise

    Derry   K.  

    \0
    Download Collect
  • Infertilit?t bei M?nnern

    Nieschlag   E.  

    Download Collect
  • John M. T. Finney: Distinguished Surgeon and Oslerphile

    Stone   Marvin J.  

    Download Collect
  • X-FEL Quadrupole with Gradient of 100 T/m

    Okunev, Ivan   Morozov, Ivan   Nefedov, Nikolay  

    Download Collect
  • Booker T. Washington in American Memory by Kenneth M. Hamilton

    Jackson, Kellie Carter  

    Download Collect
  • A (t,m,n)-Group Oriented Secret Sharing Scheme

    Miao Fuyou   Fan Yuanyuan   Wang Xingfu   Xiong Yan   Badawy, Moaman  

    Basic (t,n)-Secret sharing (SS) schemes share a secret among n shareholders by allocating each a share. The secret can be reconstructed only if at least t shares are available. An adversary without a valid share may obtain the secret when more than t shareholders participate in the secret reconstruction. To address this problem, the paper introduces the notion and gives the formal definition of (t, m, n)-Group oriented secret sharing (GOSS); and proposes a (t,m,n)-GOSS scheme based on Chinese remainder theorem. Without any share verification or user authentication, the scheme uses Randomized components (RC) to bind all participants into a tightly coupled group, and ensures that the secret can be recovered only if all m (m >=3D t) participants in the group have valid shares and release valid RCs honestly. Analysis shows that the proposed scheme can guarantee the security of the secret even though up to m-1 RCs or t-1 shares are available for adversaries. Our scheme does not depend on any assumption of hard problems or one way functions.
    Download Collect
  • Fertilit?t bei M?nnern über 40

    Zitzmann   M.  

    Download Collect
  • Insulintherapie bei Typ-2-Diabetes – so sp?t wie m?glich!

    Jacob   Stephan  

    Download Collect
  • The Cambridge Rawls Lexicon || Scanlon, T. M.

    Mandle, Jon   Reidy, David A.  

    Download Collect
  • Can you t[æ]ll I’m from M[æ]lbourne?

    Loakes, Deborah; Hajek, John; Fletcher, Janet  

    This study gives an overview of the merger of the DRESS and TRAP vowels before laterals, which occurs for some speakers of Australian English in the state of Victoria (in the south-east of the country), as well as in some other varieties of English. Research on this phenomenon in Australian English has been preliminary to date, but has uncovered some general tendencies in distribution, as well as possible motivators for actuation and spread of the change. The aim of this paper is to describe and orient the phenomenon in the context of English worldwide, and while we work with some illustrative experimental data, our aim is not to provide a detailed quantitative sociophonetic perspective here. This paper further aims to illustrate the extent of the variability seen in the Australian English community with respect to ongoing change.
    Download Collect
  • D?monenglaube im Islam () || 6. Zur Liminalit?t: Die D?monen als Grenzwesen

    Nünlist   Tobias  

    Download Collect
  • Islam in the Modern World - Edited by Jeffrey T. Kenney and Ebrahim Moosa

    Majid Daneshgar  

    Download Collect
  • GOMSS: A Simple Group Oriented (t, m, n) Multi-secret Sharing Scheme

    Miao Fuyou   Wang Li   Ji Yangyang   Xiong Yan  

    In most (t, n)-Multi-secret sharing ((t, n) MSS) schemes, an illegal participant, even without any valid share, may recover secrets when there are over t participants in secret reconstructions. To address this problem, the paper presents the notion of Group oriented (t, m, n)-multi-secret sharing (or (t, m, n)-GOMSS), in which recovering each secret requires all m (n > m > t) participants to have valid shares and actually participate in secret reconstruction. As an example, the paper then proposes a simple (t, m, n)-GOMSS scheme. In the scheme, every shareholder has only one share; to recover a secret, m shareholders construct a Polynomial-based randomized component (PRC) each with the share to form a tightly coupled group, which forces the secret to be recovered only with all m valid PRCs. As a result, the scheme can thwart the above illegal participant attack. The scheme is simple as well as flexible and does not depend on conventional hard problems or one way functions.
    Download Collect
  • T. M. CHARLES-EDWARDS. Wales and the Britons, 350-1064.

    Higham   N.  

    Download Collect
1 2 3 4 5 6 7 8 9 10

Contact

If you have any feedback, Please follow the official account to submit feedback.

Turn on your phone and scan

Submit Feedback