Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
BSAS: a blockchain-based trustworthy and privacy-preserving speed advisory system
Consensus-based Speed Advisory System (CSAS) is used to recommend a consensus
speed to a group of vehicles for specific application purposes, such as minimizing emissions …
speed to a group of vehicles for specific application purposes, such as minimizing emissions …
[КНИГА][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
[КНИГА][B] Cryptography: theory and practice
DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …
enormous praise and popularity, and soon became the standard textbook for cryptography …
[КНИГА][B] Information theory and network coding
RW Yeung - 2008 - books.google.com
This book is an evolution from my book A First Course in Information Theory published in
2002 when network coding was still at its infancy. The last few years have witnessed the …
2002 when network coding was still at its infancy. The last few years have witnessed the …
Towards photography through realistic fog
Imaging through fog has important applications in industries such as self-driving cars,
augmented driving, airplanes, helicopters, drones and trains. Here we show that time …
augmented driving, airplanes, helicopters, drones and trains. Here we show that time …
Minimal vectors in linear codes
A Ashikhmin, A Barg - IEEE Transactions on Information Theory, 1998 - ieeexplore.ieee.org
Minimal vectors in linear codes arise in numerous applications, particularly, in constructing
decoding algorithms and studying linear secret sharing schemes. However, properties and …
decoding algorithms and studying linear secret sharing schemes. However, properties and …
[КНИГА][B] A first course in information theory
RW Yeung - 2012 - books.google.com
A First Course in Information Theory is an up-to-date introduction to information theory. In
addition to the classical topics discussed, it provides the first comprehensive treatment of the …
addition to the classical topics discussed, it provides the first comprehensive treatment of the …
Scalable and privacy-preserving data sharing based on blockchain
With the development of network technology and cloud computing, data sharing is becoming
increasingly popular, and many scholars have conducted in-depth research to promote its …
increasingly popular, and many scholars have conducted in-depth research to promote its …
Entropy measures and unconditional security in cryptography
C Cachin - 1997 - research-collection.ethz.ch
One of the most important properties of a cryptographic system is a proof of its security. In the
present work, information-theoretic meth¬ ods are used for proving the security of …
present work, information-theoretic meth¬ ods are used for proving the security of …
Two secret sharing schemes based on Boolean operations
D Wang, L Zhang, N Ma, X Li - Pattern Recognition, 2007 - Elsevier
Traditional secret sharing schemes involve complex computation. A visual secret sharing
(VSS) scheme decodes the secret without computation, but each shadow is m times as big …
(VSS) scheme decodes the secret without computation, but each shadow is m times as big …