>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 key相关记录1672条 . 查询时间(0.64 秒)
Although clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated protein (Cas)-mediated gene editing has revolutionized biology and plant breeding, large-scale, heritable ...
Plants are frequently subjected to different combinations of abiotic stresses, such as high light (HL) intensity, and elevated temperatures. These environmental conditions pose a threat to agriculture...
Ubiquitination-mediated protein degradation plays important roles in ABA signal transduction and delivering responses to chloroplast stress signals in plants, but additional E3 ligases of protein ubiq...
针对痕量核素测量时,特征峰容易部分或全部被背景掩盖,提出多重Sallen-Key(MultipleSallen-Key,MSK)谱线处理技术,实现在高背景低含量X射线荧光光谱(X-RayFluorescence,XRF)分析中的应用。对MSK与多次高斯平滑的对比分析表明,在相同平滑效果下,MSK平滑次数更少,代码执行效率更高。对镉大米标准样的XRF实测谱线,做MSK平滑处理后,可以提高工作曲线的线...
该研究以渗入了海岛棉基因组组分的优质种质鲁原343为亲本,构建了包含239个重组自交系的遗传作图群体,利用SLAF标签构建了高密度遗传图谱,结合7个环境的表型数据,共鉴定104个纤维品质和产量性状QTLs,其中66个QTL共定位于19个QTL簇中。该研究团队通过进一步对鲁原343进行全基因组深度测序,解析鲁原343的遗传组成及其对纤维相关性状的遗传贡献,发现来自G. hirsutum races(...
Coronavirus disease 2019 (COVID-19), caused by the novel human coronavirus SARS-CoV-2, is currently a major threat to public health worldwide. The viral spike protein binds the host receptor angiotens...
Password-Authenticated Key Exchange (PAKE) is a method to establish cryptographic keys between two users sharing a low-entropy password. In its asymmetric version, one of the users acts as a server an...
Vehicular Ad-hoc Networks (VANETs) are a cardinal part of intelligent transportation system (ITS) which render various services in terms of traffic and transport management. The VANET is used to manag...
We present a machine-checked proof of security for the domain management protocol of Amazon Web Services' KMS (Key Management Service) a critical security service used throughout AWS and by AWS custom...
The elliptic curve cryptography plays a central role in various cryptographic schemes and protocols. For efficiency reasons, Edwards curves and twisted Edwards curves have been introduced. In this pap...
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introd...
We propose two efficient public key encryption (PKE) schemes satisfying key dependent message security against chosen ciphertext attacks (KDM-CCA security). The first one is KDM-CCA secure with respec...
The goal of white-box cryptography is to provide security even when the cryptographic implementation is executed in adversarially controlled environments. White-box implementations nowadays appear in ...
In this paper, we present the first fully asynchronous distributed key generation (ADKG) algorithm as well as the first distributed key generation algorithm that can create keys with a dual (f,2f+1)&#...
In 1998, Jerey Hostein, Jill Pipher, and Joseph H. Silverman introduced the famous Ntru cryptosystem, and called it "A ring-based public key cryptosystem". Actually it turns out to be a lattice based ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...