X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
语文学习 (64) 64
课外阅读 (54) 54
performing operations (49) 49
transporting (49) 49
阅读知识 (48) 48
作文 (46) 46
学生 (41) 41
老师 (39) 39
中学生 (34) 34
文学作品 (34) 34
文学 (27) 27
孩子 (26) 26
human necessities (24) 24
小学生 (24) 24
现代文学 (24) 24
blasting (23) 23
fixed constructions (23) 23
heating (23) 23
lighting (23) 23
mechanical engineering (23) 23
weapons (23) 23
班主任 (22) 22
小说 (20) 20
physics (19) 19
同学 (19) 19
教室 (19) 19
electricity (18) 18
学校 (17) 17
上课 (15) 15
故事 (15) 15
building (14) 14
教师 (14) 14
妈妈 (13) 13
就这样 (13) 13
给你 (13) 13
语文教学 (12) 12
课堂 (12) 12
生活 (11) 11
coffee mills (10) 10
domestic articles or appliances (10) 10
engineering elements and units (10) 10
furniture (10) 10
general measures for producing and maintaining effectivefunctioning of machines or installations (10) 10
spice mills (10) 10
suction cleaners in general (10) 10
thermal insulation in general (10) 10
世界 (10) 10
人生 (10) 10
母亲 (10) 10
眼睛 (10) 10
课堂教学 (10) 10
basic electric elements (9) 9
个人 (9) 9
在路上 (9) 9
对我说 (9) 9
小学 (9) 9
散文 (9) 9
杂文 (9) 9
老板 (9) 9
agriculture (8) 8
animal husbandry (8) 8
cryptography (8) 8
fishing (8) 8
forestry (8) 8
hunting (8) 8
land vehicles for travelling otherwise than on rails (8) 8
measuring (8) 8
testing (8) 8
trapping (8) 8
一本 (8) 8
初中 (8) 8
办公室 (8) 8
父亲 (8) 8
chemistry (7) 7
construction of roads, railways, or bridges (7) 7
hand-propelled vehicles, e.g. hand carts, perambulators (7) 7
metallurgy (7) 7
sledges (7) 7
不知道 (7) 7
中国 (7) 7
公司 (7) 7
当代作品 (7) 7
我不知道 (7) 7
教育 (7) 7
朋友 (7) 7
阳光 (7) 7
building implements or other building aids, or theiruse (6) 6
buildings or like structures for particular purposes (6) 6
fencing (6) 6
forms (6) 6
frames, casings, or beds of engines or other machines orapparatus not specific to an engine, machine, or apparatusprovided for elsewhere (6) 6
functional features or details of lighting devices or systemsthereof (6) 6
handling building materials on the site (6) 6
hauling (6) 6
hoisting (6) 6
lifting (6) 6
masts (6) 6
repairing, breaking-up or other work on existingbuildings (6) 6
scaffolding (6) 6
shuttering (6) 6
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Computers & security, ISSN 0167-4048, 2019, Volume 85, pp. 353 - 371
Blacklistable anonymous credential systems provide service providers with a way to authenticate users according to their historical behaviors, while... 
Blacklistable anonymous credential | Authentication | Anonymous credential | Blockchain | Decentralized anonymous credential | COMPUTER SCIENCE, INFORMATION SYSTEMS | IDENTIFICATION | Computer science | Usage | Blacklisting | Cryptography
Journal Article
Security and Communication Networks, ISSN 1939-0114, 07/2016, Volume 9, Issue 11, pp. 1613 - 1629
Continual memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes that were considered secure in traditional... 
continual memory attacks | keyword search | anonymous identity‐based encryption | public‐key encryption | anonymous identity-based encryption | public-key encryption | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | Cryptography | Memory | Leakage | Searching | Concrete construction | Polyetherketones | Transformations | Encryption | Security
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 10946, pp. 720 - 738
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 10946, pp. 502 - 519
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 9326, pp. 266 - 285
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 11058, pp. 474 - 483
Conference Proceeding
Future Generation Computer Systems, ISSN 0167-739X, 01/2018, Volume 78, pp. 763 - 777
Fog Computing, a technology that takes advantage of both the paradigms of Cloud Computing and the Internet of Things, has a great advantage in reducing the... 
Fog computing | Pair encoding | Dual system methodology | Functional encryption | Leakage Resilient Cryptography | FORENSIC DATA | INTERNET | PRIVACY | IDENTITY-BASED ENCRYPTION | CHALLENGES | DUAL SYSTEM ENCRYPTION | THINGS | SECURITY | FRAMEWORK | COMPUTER SCIENCE, THEORY & METHODS | Computer science | Access control | Sensors | Cryptography | Analysis
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 01/2018, Volume 78, pp. 799 - 806
Fog Computing, which has the advantage of both the Cloud Computing and the Internet of Things, has changed our daily lives. One important property of the Fog... 
Position based cryptography | Location privacy | Location verification | Bounded retrieval model | Fog Computing | AUTHENTICATION | COMPUTER SCIENCE, THEORY & METHODS | VERIFICATION | Computer science | Privacy | Information science | Cryptography | Analysis
Journal Article
2016 IEEE Transportation Electrification Conference and Expo, Asia-Pacific (ITEC Asia-Pacific), 06/2016, pp. 192 - 197
In this paper, a new open-winding control strategy is proposed for a brushless doubly-fed reluctance generator (BDFRG) applicable for wind turbines. The BDFRG... 
direct power control | brushless doubly-fed reluctance generator (BDFRG) | Torque | Redundancy | Generators | maximum power point tracking (MPPT) | common mode voltage elimination | open-winding | Electric potential | Reluctance | Power control | Voltage | Converters | Electronics | Active control
Conference Proceeding
Proceedings of the 2018 on asia conference on computer and communications security, 05/2018, pp. 659 - 672
Outsourcing the decryption of attribute-based encryption (ABE) ciphertext is a promising way to tackle the question of how users can perform decryption... 
cross-system | pair encoding | attribute-based encryption | proxy re-encryption | publickey encryption | Public-key encryption | Attribute-based encryption | Pair encoding | Cross-system | Proxy re-encryption
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 11035, pp. 63 - 80
Conference Proceeding
北京纪事, ISSN 1005-9075, 2012, Issue 4, pp. 50 - 53
6岁师从李连杰 涂圣成1985年出生于台湾省台北市,家中有两个妹妹和一个弟弟。母亲是全职主妇,照顾一家人的生活起居,父亲则是台湾省乃至全国都非常著名的气功大师与武术家,九九神功的创始者——涂金盛先生。 
生活起居 | 成龙 | 李连杰 | 弟子 | 台湾省 | 武术家 | 台北市
Journal Article
Security and communication networks, ISSN 1939-0114, 07/2016, Volume 9, Issue 11, pp. 1613 - 1629
Journal Article
九江职业技术学院学报, ISSN 1009-9522, 2013, Issue 3, pp. 19 - 20
本文借助有限元软件 MSC.PATRAN/NASTRAN,以18000dwt成品油船为例,对锚机在工作时不同工况下的受力进行计算分析,进而讨论采用不同的措施,如:钢板加厚,对位加强等,以达到锚机底座下甲板结构满足强度要求的目的。 
锚机底座 | 甲板结构优化 | 有限元 | 载荷
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9722, pp. 443 - 460
Conference Proceeding
Chinese Journal of Endemiology, ISSN 1000-4955, 05/2016, Volume 37, Issue 5, pp. 629 - 633
Journal Article
International Journal of Embedded Systems, ISSN 1741-1068, 2015, Volume 7, Issue 3-4, pp. 216 - 229
Public-key encryption can be used in cloud systems to protect data in data sharing, identity authentication, etc. However, traditional public-key encryption... 
Weak leakage-resilient | Extractable hash proof system | Key encapsulation | Side-channel attacks | Leakage | Encapsulation | Construction | Proving | Transformations | Encryption | Cryptography | Hash based algorithms
Journal Article
2019
硕士: 控制科学与工程; V44;V24 
Dissertation
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.