期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
New and Unusual Cat's Eyes and Asteriated Gems
1
作者 Martin P.Steinbach Lore Kiefert Jeanette Fiedler 《宝石和宝石学杂志(中英文)》 CAS 2022年第1期1-11,共11页
The article describes 6 types of gemstones which show phenomena such as chatoyancy and asterism.The gemstones have not been described before,either because they come from new sources,or because the phenomenon has not ... The article describes 6 types of gemstones which show phenomena such as chatoyancy and asterism.The gemstones have not been described before,either because they come from new sources,or because the phenomenon has not been seen before in the type of gemstone described.Gems from the new sources are star garnet from the Karelia Province in Russia,and star garnet from the Jiangsu Province in China.Grandidierite usually does not show a cat’s eye effect,but the two described samples display a weak cat’s eye.An unusual white quartz from Brazil with a sharp cat’s eye is described,as well as a star sapphire with two differently coloured stars on each side of the cabochon,as well as a trapiche-type quartz.The stones were tested with gemmological,microscopic,and advanced techniques and the results are presented. 展开更多
关键词 cat’s eye star asterism chatoyancy QUARTZ grandidierite SAPPHIRE GARNET
在线阅读 下载PDF
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes
2
作者 吴永东 Member, IEEE 邓慧杰 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第2期362-374,共13页
In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protection functionalities and is capable of... In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protection functionalities and is capable of defeating most multiple-round based traitor tracing schemes such as the schemes based on the black-box confirmation method. In particular, the proposed pirate decoder is customized to defeat the private key and the public key fully collusion resistant traitor tracing (FTT) schemes, respectively. We show how the decoder prolongs a trace process so that the tracer has to give up his effort. FTT schemes are designed to identify all the traitors. We show that decoder enables the FTT schemes to identify at most 1 traitors. Finally, assuming the decoder is embedded with several bytes of memory, we demonstrate how the decoder is able to frame innocent users at will. 展开更多
关键词 broadcast encryption multi-key pirate decoder traitor tracing
原文传递
移动与无线通讯网络
3
作者 Khaldoun Al Agha(K.阿尔-阿格哈)(编) Cambyse Guy Omidyar(C.奥米戴尔)(编) 胡光华 《国外科技新书评介》 2005年第7期20-21,共2页
“第5届移动无线通讯网络会议”(MWCN2003)于2003年10月27~29日在新加坡举行。这次会议是由新加坡通讯研究所和IFIP—TC6WG6.8合作安排组织的。在这次国际会议上科学家、工业界与开发商聚集在一起,讨论与介绍移动与无线通讯研究及... “第5届移动无线通讯网络会议”(MWCN2003)于2003年10月27~29日在新加坡举行。这次会议是由新加坡通讯研究所和IFIP—TC6WG6.8合作安排组织的。在这次国际会议上科学家、工业界与开发商聚集在一起,讨论与介绍移动与无线通讯研究及在工业中的新发展。会议收到了140篇论文。经过仔细地审查与选择之后,有60篇论文在会议上宣读。另外,会上还有14篇告示。 展开更多
关键词 无线通讯网络 网络会议 国际会议 新加坡 工业界 第5届 研究所 科学家 开发商
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部