• 沒有找到結果。

A Covert Communication Method via Spreadsheets by Secret Sharing with a Self-Authentication Capability

N/A
N/A
Protected

Academic year: 2022

Share "A Covert Communication Method via Spreadsheets by Secret Sharing with a Self-Authentication Capability"

Copied!
39
0
0

加載中.... (立即查看全文)

全文

Loading

參考文獻

相關文件

The disadvantage of the inversion methods of that type, the encountered dependence of discretization and truncation error on the free parameters, is removed by

GCG method is developed to minimize the residual of the linear equation under some special functional.. Therefore, the minimality property does not hold... , k) in order to construct

• to develop a culture of learning to learn through self-evaluation and self-improvement, and to develop a research culture for improving the quality of learning and teaching

Chen, The semismooth-related properties of a merit function and a descent method for the nonlinear complementarity problem, Journal of Global Optimization, vol.. Soares, A new

A subgroup N which is open in the norm topology by Theorem 3.1.3 is a group of norms N L/K L ∗ of a finite abelian extension L/K.. Then N is open in the norm topology if and only if

Miroslav Fiedler, Praha, Algebraic connectivity of graphs, Czechoslovak Mathematical Journal 23 (98) 1973,

 Local, RADIUS, LDAP authentication presents user with a login page.  On successful authentication the user is redirected to

/** Class invariant: A Person always has a date of birth, and if the Person has a date of death, then the date of death is equal to or later than the date of birth. To be