搜索结果: 1-15 共查到“Weakness”相关记录31条 . 查询时间(0.054 秒)
Rice probes ways to turn cement’s weakness to strength
Rice turn cement’s weakness strength
2017/1/9
Concrete isn’t thought of as a plastic, but plasticity at small scales boosts concrete’s utility as the world’s most-used material by letting it constantly adjust to stress, decades and some...
It’s a paradox that has long vexed researchers in the field of optics.To control a light source, another light source that uses as much energy — if not more — is often required. The setup works, but i...
Researchers find weakness in common computer chip
Researchers weakness common computer chip
2016/11/4
Researchers from Binghamton University—State University of New York and the University of California, Riverside have found a weakness in the Haswell central processing unit (CPU) components that makes...
Hip Abductor Muscle Weakness in Individuals with Gluteal Tendinopathy
HIP STRENGTH MUSCLE TESTING DYNAMOMETER GREATER TROCHANTERIC PAIN
2017/4/13
Purpose: This study aimed to compare hip abductor muscle strength between individuals with symptomatic, unilateral gluteal tendinopathy (GT), and asymptomatic controls.
Methods: Fifty individuals wit...
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
PRNG CSPRNG Spritz
2016/1/5
We found a statistical weakness in the Spritz algorithm designed by Ronald L. Rivest
and Jacob C. N. Schuldt. For N = 8: P rob(output(x) = output(x + 2)) = 1/N + 0.000498. The
bias becomes statistic...
Agency Implies Weakness of Will
autonomy agency will
2014/11/17
Notions of agency and of weakness of will clearly seem to be related to one another. This essay takes on a rather modest task in relation to current discussion of these topics; it seeks to establish t...
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols
Key agreement Tripartite Identitybased
2014/3/5
Key agreement allows multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. In recent years, several identity-based au...
In 2013, Joux, and then Barbulescu, Gaudry, Joux and Thom\'{e}, presented new algorithms for computing discrete logarithms in finite fields of small and medium characteristic. We show that these new a...
Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography
Discrete Logarithm Cryptography Weakness
2014/3/6
In 2013, Joux and then Barbulsecu et al. presented new algorithms for computing discrete logarithms in finite fields of small characteristic. Shortly thereafter, Adj et al. presented a concrete analys...
Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications
foundations quantum cryptography
2014/3/11
What is the behavior of an adversary to launch attacks against a communication? The good choice is to eavesdrop the communication such that the communicators can not detect the eavesdropping. The gene...
GLOBAL IMBALANCES: A SOURCE OF STRENGTH OR WEAKNESS?
capital markets foreign investment relative rates
2011/9/16
The article explains the lower relative rates of return that foreigners have earned on their U.S. investments, which might reflect optimal decisions in efficient capital markets. Estimates show that f...
Weakness in an ECC-based AKA Protocol for Wireless Mobile Communications
Authenticated key agreement Off-line password guessing attack
2011/7/25
With the rapid progress of wireless mobile communication, the authenticated key agreement protocol has attracted an increasing amount of attention.
Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
authentication security elliptic curve cryptosystem wireless sensor network
2011/6/9
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to their un-attended and hostile deployments. Usually, sensor nodes are equipped with limited computing...
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices
ID-based Mutual authentication Key agreement Elliptic curve Cryptosystem
2010/11/26
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement schemes for mobile devices on elliptic curve cryptosystem. In this paper, we show that Yoon et al.’s p...
Enriched weakness
2010/12/1
The basic notions of category theory, such as limit, adjunction, and orthogonality, all involve
assertions of the existence and uniqueness of certain arrows. Weak notions arise when one drops
the un...