×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [5]
北京大学 [3]
昆明植物研究所 [3]
山东大学 [3]
植物研究所 [3]
沈阳自动化研究所 [2]
更多...
内容类型
期刊论文 [19]
学位论文 [3]
其他 [2]
会议论文 [1]
发表日期
2020 [1]
2018 [1]
2017 [2]
2016 [3]
2015 [4]
2014 [3]
更多...
学科主题
Plant Scie... [5]
计算机科学技术其他学... [2]
计算机科学技术基础学... [2]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共25条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
N-dependent ozonation efficiency over nitrogen-containing heterocyclic contaminants: A combined density functional theory study on reaction kinetics and degradation pathways
期刊论文
CHEMICAL ENGINEERING JOURNAL, 2020, 卷号: 382, 页码: 10
作者:
Yao, Yujie
;
Xie, Yongbing
;
Zhao, Binran
;
Zhou, Linbi
;
Shi, Yanchun
收藏
  |  
浏览/下载:330/0
  |  
提交时间:2020/03/24
Nitrogen heterocyclic compounds (NHCs)
Ozonation
Density functional theory (DFT)
Reaction mechanism
Degradation pathway
Improved integral attacks without full codebook
期刊论文
IET INFORMATION SECURITY, 2018, 卷号: 12, 期号: 6, 页码: 513-520
作者:
Chu, Zhihui
;
Chen, Huaifeng
;
Wang, Xiaoyun
;
Li, Lu
;
Dong, Xiaoyang
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/11
cryptography
FL layer
SPN round function
key bits
bit permutation
forward rounds
data complexity
key-dependent linear function
key
recovery attack
target bits
distinguisher
improved integral attacks
基于DCR假设的KDM-CCA安全性
其他
2017-01-01
郭伟
;
常金勇
;
高磊
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2017/12/03
DCR假设
KDM安全性
CCA安全性
公钥加密
Cramer-Shoup方案
Decisional Composite Residuosity(DCR)assumption
Key-Dependent Message(KDM)security
Chosen Ciphertext Attack(CCA)security
public key encryption
Cramer-Shoup scheme
Seed-predator satiation and Janzen-Connell effects vary with spatial scales for seed-feeding insects
期刊论文
ANNALS OF BOTANY, 2017, 卷号: 119, 期号: 1, 页码: 109-116
作者:
Xiao, Zhishu
;
Mi, Xiangcheng
;
Holyoak, Marcel
;
Xie, Wenhua
;
Cao, Ke
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2022/03/28
Conspecific density
density dependence
predator satiation
pre-dispersal seed predators
Quercus
seed survival
spatio-temporal variability
Metabolomic investigation of regional brain tissue dysfunctions induced by global cerebral ischemia
期刊论文
BMC NEUROSCIENCE, 2016, 卷号: 17
作者:
Zhang, Tianshu
;
Wang, Wei
;
Huang, Jin
;
Liu, Xia
;
Zhang, Haiyan
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/01/08
Bilateral common carotid arteries occlusion
Metabolomics
NMR
Brain tissue dysfunctions
Amino acid metabolism
Structural Basis of Reversible Phosphorylation by Maize Pyruvate Orthophosphate Dikinase Regulatory Protein
期刊论文
PLANT PHYSIOLOGY, 2016, 卷号: 170, 期号: 2
作者:
Jiang, Lun
;
Chen, Yi-bo
;
Zheng, Jiangge
;
Chen, Zhenhang
;
Liu, Yujie
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2022/07/05
Structural Basis of Reversible Phosphorylation by Maize Pyruvate Orthophosphate Dikinase Regulatory Protein
期刊论文
PLANT PHYSIOLOGY, 2016, 卷号: 170, 期号: 2, 页码: 732-741
作者:
Jiang, Lun
;
Chen, Yi-bo
;
Zheng, Jiangge
;
Chen, Zhenhang
;
Liu, Yujie
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2022/07/08
Quantitative analysis of drug-induced complement-mediated cytotoxic effect on single tumor cells using atomic force microscopy and fluorescence microscopy
期刊论文
IEEE Transactions on Nanobioscience, 2015, 卷号: 14, 期号: 1, 页码: 84-94
作者:
Li M(李密)
;
Liu LQ(刘连庆)
;
Xi N(席宁)
;
Wang YC(王越超)
;
Xiao XB(肖秀斌)
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2015/03/30
Antibody
atomic force microscopy
cell
complement-mediated cytotoxicity
lymphoma
mechanical properties
Practical-time related-key attack on Hummingbird-2
期刊论文
IET INFORMATION SECURITY, 2015, 卷号: 9, 期号: 6, 页码: 321-327
Shi, ZQ
;
Zhang, B
;
Feng, DG
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2016/12/13
divide and conquer methods
cryptography
practical-time related-key attack
Hummingbird-2
lightweight cipher
MAC functionality
cryptographic notion
combination points
differential equation
internal state bits
divide and conquer strategy
cryptographic S-boxes
Improved attacks on reduced-round camellia-128/192/256
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 卷号: 9048, 页码: 59-83
作者:
Dong, Xiaoyang
;
Li, Leibo
;
Jia, Keting
;
Wang, Xiaoyun
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/17
Block cipher
Camellia
Key-dependent attack
Meet-in-the-middle attack
Multiple differential attack
©版权所有 ©2017 CSpace - Powered by
CSpace