نتایج جستجو برای: concrete macrotexture
تعداد نتایج: 76169 فیلتر نتایج به سال:
This paper presents the residual mechanical properties of concrete made with crushed bricks and clay roof tile aggregates after exposure to high temperatures. One referent mixture and eight mixtures with different percentages of replacement of natural aggregate by crushed bricks and roof tiles are experimentally tested. The properties of the concrete were measured before and after exposure to 2...
We analyze a signature scheme described in a recent Internet Draft, and highlight a variant (based on prior work of Micali and Leighton) that offers improved concrete security.
Recycled demolished concrete (DC) as recycled aggregate (RA) and recycled aggregate concrete (RAC) is generally suitable for most construction applications. Low-grade applications, including sub-base and roadwork, have been implemented in many countries; however, higher-grade activities are rarely considered. This paper examines relationships among DC characteristics, properties of their RA and...
Waters’ variant of the Boneh-Boyen IBE scheme is attractive because of its efficency, applications, and security attributes, but suffers from a relatively complex proof with poor concrete security. This is due in part to the proof’s “artificial abort” step, which has then been inherited by numerous derivative works. It has often been asked whether this step is necessary. We show that it is not,...
abstract in aggregate, active forms of reactive silica with mineral names are sometimes associated with sand and gravel in concrete mixture. alkali hydroxides originated from alkalis in the cement or other resources form an alkaline silica gel with this reactive silica which becomes swallowed and expanded during time causing damage to concrete. there have been growing researches on alkaline r...
In this note, we describe an error in the proof for CLRW2 given by Landecker et al. in their paper at CRYPTO 2012 on the beyond-birthday-bound security for tweakable block ciphers. We are able to resolve the issue, give a new bound for the security of CLRW2, and identify a potential limitation of this proof technique when looking to extend the scheme to provide asymptotic security.
M. Naor (Ed.): TCC 2004, LCNS 2951, pages 336 352, February 2004. c © Springer-Verlag Berlin Heidelberg 2004. Abstract. We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the well-known simulatability approach of modern cryptography, i.e., the specification is an ideal system and a real system should in some sense simulate this ideal one...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید