[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability

F Su, J Yuan - … -stability-chinese-literature-review …, 2022 - europeanleadershipnetwork.org
… A comparative study of the views between the expert community and the official positions
would be useful to identify areas of convergence and divergence. This would enable us to …

[PDF][PDF] Politics and Idiosyncrasy of Information: Evidence from Financial Analysts' Earnings Forecasts in a Relationship-based Economy

F Wong, TJ Wong, T Zhang - 2020 - msbfile03.usc.edu
… In this paper, we use a topical modeling analysis to study how politics … In this section, we
first examine the type of information that creates the comparative advantage among financial …

[HTML][HTML] Gabor filter for image processing and computer vision

N Petkov, MB Wieling - On line), http://matlabserver. cs. rug. nl …, 2008 - csdndocs.com
… The values 0 and 180 correspond to center-symmetric 'center-on' and 'center-off' functions,
respectively, while -90 and 90 correspond to anti-symmetric functions. All other cases …

基于物联网的属性基加密研究

王玮 - 2020 - ir.lzu.edu.cn
… cannot be well applied in the Internet of things. Therefore, this paper mainly explores and
studies the attribute-based encryption scheme in the Internet of things. In this paper, we first …

工業物聯網加密的串流密碼機制

CC Lin, SH Chang - Communications of the CCISA, 2018 - cccisa.niu.edu.tw
encryption algorithm. The experimental results prove that the WG-8 encryption algorithm, …
industrial Internet of Things more secure communication methods and device certification. …

TrustChain: 具有可信执行环境的隐私保护智能合约模型⋆

F Wu, A Ye, Y Diao, Y Zhang, J Chen… - Available at SSRN … - papers.ssrn.com
… At the same time, most Internet of things devices have the low computing power and
cannot support high-intensity computing. Encryption algorithms will increase the computational …

[PDF][PDF] 阁EasyChair Preprint

SB Bharath, D Chandrasekaran, MS Minu - 2020 - easychair.org
… host A currently available cryptographic algorithm is used to make sure that the data is
communicated between the host with a complete security, which is a very secure algorithm. IoT is …

基于椭圆曲线的RFID 电子标签加密算法研究

张艺与, 赵海军, 贺春林, 陈毅红 - 云南大学学报(自然科学版), 2021 - yndxxb.ynu.edu.cn
… Nanchong Key Laboratory of Internet of Things Perception and Big Data Analysis, Nanchong
studies the encryption of electronic tag data in the core technology of the Internet of Things,…

[PDF][PDF] IoT-Based Smart Office System TS Architecture Using Smartphones 醫官

RP Priya, J Marietta, D Rekha, BC Mohan, A Amolik - researchgate.net
Internet of things due to its profound capability has been responsible for the innovative
transformations in lifestyles of human. We propose a system for the smart office environment …

面向嵌入式系统的基于混沌的快速图像加密算法

林志浩 - 2019 - ir.lzu.edu.cn
… So, running chaos-based image encryption algorithms on embedded devices not only …
image encryption algorithm. Compared with traditional chaos-based image encryption algorithms, …