منابع مشابه
The anisotropy of Leighton Buzzard sand under general stress conditions
A hollow cylinder apparatus was used to investigate the inherent anisotropy and membrane penetration of Leighton Buzzard sand test-specimens. The degree of inherent anisotropy was found to be independent of the mean effective stress but dependent on the initial relative density of the test-specimen. In the vertical-tohorizontal directions, the degree of inherent anisotropy decreases with increa...
متن کاملChris Leighton
Electronic and magnetic materials are the central focus of our group's research. We study a wide variety of types of materials such as nanostructures, thin films, multilayered heterostructures, and bulk polycrystals and single crystals. We have interests in several areas including the interplay between electronic transport and magnetism in novel materials, and the study of interfaces between di...
متن کاملHow to Break and Repair Leighton and Micali ' sKey Agreement
A key agreement (or distribution) protocol is a set of communication rules whereby two users can establish a shared common key. The shared key can be used by the users in future secure communications. We analyze a key agreement protocol presented by Leighton and Micali at the CRYPTO'93 conference, which is based on tamper-proof hardware, and show that the protocol fails in that a common key sha...
متن کاملBrownian penalisations related to excursion lengths, VII
Limiting laws, as t →∞, for Brownian motion penalised by the longest length of excursions up to t , or up to the last zero before t , or again, up to the first zero after t , are shown to exist, and are characterized. Résumé. Il est prouvé que les lois limites, lorsque t → ∞, du mouvement brownien pénalisé par la plus grande longueur des excursions jusqu’en t , ou bien jusqu’au dernier zéro ava...
متن کاملAmending Leighton and Micali's Key Distribution Protocol
A key distribution protocol is a set of rules by which two users can establish a shared common key between them and then use the key in future secure communications. We analyze a key distribution protocol presented by Leighton and Micali at the CRYPTO'93 conference, which is based on tamper-proof hardware, and show that the protocol fails in that a common key shared between two users can always...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the Geologists' Association
سال: 1908
ISSN: 0016-7878
DOI: 10.1016/s0016-7878(08)80300-8