3 resultados para Unique factorisation Rings
em DigitalCommons@University of Nebraska - Lincoln
Resumo:
The high electronegativity and small size of the fluorine atom and the high stability of C-F bonds impart interesting properties and applications to fluorine containing polymers. The unique properties of fluoropolymers include high thermal stability, improved chemical resistance, low surface energies, low coefficients of friction, and low dielectric constants. Applications of fluorinated polymers include use as noncorrosive materials, polymer processing aids, chemically resistant and antifouling coatings, as well as interlayer dielectrics. Fluorine-containing polymers can be directly synthesized via polymerization of fluorine-containing monomers or by post-polymerization modification. The latter method can be used to attach fluorinated species, such as perfluoroalkyl groups, onto conventional polymer chains, thereby imparting properties of fluorine-containing polymers into conventional polymers and widening their range of potential applications.
Resumo:
Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Many key management protocols have been specifically designed for wireless sensor networks. However, most of the key management protocols focus on the establishment of the required keys or the removal of the compromised keys. The design of these key management protocols does not consider the support of higher level security applications. When the applications are integrated later in sensor networks, new mechanisms must be designed. In this paper, we propose a security framework, uKeying, for wireless sensor networks. This framework can be easily extended to support many security applications. It includes three components: a security mechanism to provide secrecy for communications in sensor networks, an efficient session key distribution scheme, and a centralized key revocation scheme. The proposed framework does not depend on a specific key distribution scheme and can be used to support many security applications, such as secure group communications. Our analysis shows that the framework is secure, efficient, and extensible. The simulation and results also reveal for the first time that a centralized key revocation scheme can also attain a high efficiency.
Resumo:
This session addresses the unique challenges of African-American women academicians at predominantly white institutions. After assessing scholarly literature in this area, most research has and continues, to ignore the interrelationship between race, class and gender. This paper builds on existing literature by offering a discourse that addresses various challenges facing these women.