募捐 9月15日2024 – 10月1日2024
关于筹款
书籍搜索
书
募捐:
21.8% 达到
登录
登录
访问更多功能
个人推荐
Telegram自动程序
下载历史
发送到电子邮件或 Kindle
管理书单
保存到收藏夹
个人的
书籍请求
探索
Z-Recommend
书单
最受欢迎
种类
贡献
捐款
上载
Litera Library
捐赠纸质书籍
添加纸质书籍
Search paper books
创建 LITERA Point
搜索关键词
Main
搜索关键词
search
1
Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings
Springer-Verlag Berlin Heidelberg
Fuchun Guo
,
Yi Mu
,
Zhide Chen (auth.)
,
Feng Bao
,
San Ling
,
Tatsuaki Okamoto
,
Huaxiong Wang
,
Chaoping Xing (eds.)
key
signature
network
protocol
node
algorithm
nodes
security
adversary
secure
signatures
random
privacy
springer
schemes
heidelberg
lncs
undeniable
encryption
mobile
queries
hash
anonymity
networks
probability
proposed
first
client
attacks
query
outputs
graph
puzzles
keys
authentication
puzzle
server
eab
input
certificate
systems
function
psmt
messages
peks
different
corresponding
otherwise
ê
mobility
年:
2007
语言:
english
文件:
PDF, 6.14 MB
您的标签:
0
/
0
english, 2007
2
Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings
Springer-Verlag Berlin Heidelberg
Fuchun Guo
,
Yi Mu
,
Zhide Chen (auth.)
,
Feng Bao
,
San Ling
,
Tatsuaki Okamoto
,
Huaxiong Wang
,
Chaoping Xing (eds.)
key
signature
network
protocol
node
algorithm
nodes
security
adversary
secure
signatures
random
privacy
springer
schemes
heidelberg
lncs
undeniable
encryption
mobile
queries
hash
anonymity
networks
probability
proposed
first
client
attacks
query
outputs
graph
puzzles
keys
authentication
puzzle
server
eab
input
certificate
systems
function
psmt
messages
peks
different
corresponding
otherwise
ê
mobility
年:
2007
语言:
english
文件:
PDF, 3.48 MB
您的标签:
0
/
0
english, 2007
3
Lindenbaum Method
Alex Citkin
,
Alexei Muravitsky
formula
consequence
matrix
proposition
abstract
formulas
prove
definition
structural
substitution
valuation
w.r.t
assume
implies
logical
define
lemma
first
cns
fml
formal
denote
corollary
defined
unital
modus
algebras
card
logics
suppose
reader
α1
lindenbaum
arbitrary
matrices
valid
αn
element
observe
finite
adequate
αi
heyting
sets
variables
σs
congruence
obtained
boolean
latter
年:
2018
语言:
english
文件:
PDF, 844 KB
您的标签:
0
/
0
english, 2018
4
Феноменология и анализ данных по рассеянию нуклонов
МГУ
Легар Ф.
,
Строковский Е.А.
θ1
θ2
θcm
φ4
φ3
wxa
φ2
φ1
dσ
dω
rnp
exp
p̃1
dn0n0
αcm
p̃2
0k0
0s0
k0nn0
hwv
_z
cnn00
k0s
λ4
n0s
yuv
00k
λ2
λ3
n1k
λ1
a00kk
k0k
00s
a00nn
n2k
cnk
cns
n0k
n1s
n2s
d0s
σ0
σck
σcs
a00sk
cce
clln0
cmln0
d0k
年:
2010
语言:
russian
文件:
PDF, 1.45 MB
您的标签:
0
/
0
russian, 2010
5
CHP-13
Administrator
key
coupling
mpa
diameter
stress
flange
shear
torque
transmitted
bolts
mm2
τc
keys
crushing
maximum
induced
muff
thickness
contents
considering
permissible
shearing
stresses
τk
bolt
r.p.m
keyway
shown
sunk
σck
width
τs
bush
tmax
flexible
proportions
check
sleeve
textbook
steel
allowable
couplings
designed
hollow
protective
τb
flanges
discussed
rectangular
forces
年:
2008
语言:
english
文件:
PDF, 611 KB
您的标签:
0
/
0
english, 2008
1
按照
此链接
或在 Telegram 上找到“@BotFather”机器人
2
发送 /newbot 命令
3
为您的聊天机器人指定一个名称
4
为机器人选择一个用户名
5
从 BotFather 复制完整的最后一条消息并将其粘贴到此处
×
×