Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Riva, Ben"'
Autor:
Baldimtsi, Foteini, Chalkias, Konstantinos Kryptos, Ji, Yan, Lindstrøm, Jonas, Maram, Deepak, Riva, Ben, Roy, Arnab, Sedaghat, Mahdi, Wang, Joy
For many users, a private key based wallet serves as the primary entry point to blockchains. Commonly recommended wallet authentication methods, such as mnemonics or hardware wallets, can be cumbersome. This difficulty in user onboarding has signific
Externí odkaz:
http://arxiv.org/abs/2401.11735
Publikováno v:
In Information and Computation May 2013 226:16-36
Publikováno v:
Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I; 2015, p229-259, 31p
Autor:
Lindell, Yehuda, Riva, Ben
Publikováno v:
Advances in Cryptology - CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II; 2014, p476-494, 19p
Publikováno v:
Advances in Cryptology - EUROCRYPT 2014; 2014, p387-404, 18p
Publikováno v:
Cardiovascular research. 27(12)
Objective: The aim was to study the effects of the collagen mesh that interconnects the myocardial fibres on left ventricular mechanics and intramyocardial pressure. Methods: An earlier model which integrates a symmetrical left ventricular geometry a
Publikováno v:
Developments in Cardiovascular Medicine ISBN: 9781461367376
While the waterfall (WF) model predicts coronary arterial inflow reasonably well, it fails to predict venous flow. This is adequately predicted here by a pressure dependent (PD) model of transmural myocardial perfusion to the intramyocardial pressure
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b61649eb622334777dbb84012df446c
https://doi.org/10.1007/978-1-4615-3894-3_25
https://doi.org/10.1007/978-1-4615-3894-3_25
Autor:
Mohassel, Payman, Riva, Ben
Publikováno v:
Advances in Cryptology - CRYPTO 2013; 2013, p36-53, 18p
Publikováno v:
Information Theoretic Security (9783642322839); 2012, p37-61, 25p
Publikováno v:
Proceedings of the 18th ACM Conference: Computer & Communications Security; Oct2011, p445-454, 10p