首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2篇
  免费   0篇
化学   1篇
物理学   1篇
  2021年   1篇
  1963年   1篇
排序方式: 共有2条查询结果,搜索用时 0 毫秒
1
1.
Zusammenfassung Das Verhalten des Hydrazins und seiner Derivate gegenüber verschiedenen Oxydationsmitteln wurde untersucht. Die Bedingungen zur raschen Mikrobestimmung des Hydrazins, seiner mono- und disubstituierten organischen Derivate mit 0,02-n Bromatlösung sowie der monosubstituierten Hydrazinderivate mit 0,02-n Jodlösung in alkalischem Milieu werden angegeben.
Summary A study was made of the behavior of hydrazine and its derivatives toward various oxidants. The conditions are stated for the rapid microdetermination of hydrazine and of its mono- and disubstituted organic derivatives with 0.02N bromate solution and also of the monosubstituted hydrazine derivatives with 0.02N iodine solution in alkaline surroundings.

Résumé On étudie le comportement de l'hydrazine et de ses dérivés vis-à-vis de plusieurs agents oxydants. On communique les conditions d'un microdosage rapide de l'hydrazine et de ses dérivés organiques mono et disubstitués par une solution de bromate 0,02N, ainsi que de ses dérivés monosubstitués par une solution d'iode 0,02N en milieu alcalin.

Riassunto E' stato studiato il comportamento delle idrazine con reattivi ossidanti come: bromato e iodato di potassio, cloruro di bromo, acido iodico e iodio in soluzione alcalina.Sono state definite le condizioni per la microdeterminazione volumetrica rapida della funzione idrazinica nelle idrazine aromatiche sia mono- che bi-sostituite con soluzione di bromato di potassio 0,02-n e di quelle monosostituite con soluzione di iodio in ambiente alcalino.


Die analysierten Substanzen wurden uns liebenswürdigerweise von Frl. Dr.Maria Ada Iorio17 aus diesem Institut zur Verfügung gestellt.  相似文献   
2.
Lightweight session key agreement schemes are expected to play a central role in building Internet of things (IoT) security in sixth-generation (6G) networks. A well-established approach deriving from the physical layer is a secret key generation (SKG) from shared randomness (in the form of wireless fading coefficients). However, although practical, SKG schemes have been shown to be vulnerable to active attacks over the initial “advantage distillation” phase, throughout which estimates of the fading coefficients are obtained at the legitimate users. In fact, by injecting carefully designed signals during this phase, a man-in-the-middle (MiM) attack could manipulate and control part of the reconciled bits and thus render SKG vulnerable to brute force attacks. Alternatively, a denial of service attack can be mounted by a reactive jammer. In this paper, we investigate the impact of injection and jamming attacks during the advantage distillation in a multiple-input–multiple-output (MIMO) system. First, we show that a MiM attack can be mounted as long as the attacker has one extra antenna with respect to the legitimate users, and we propose a pilot randomization scheme that allows the legitimate users to successfully reduce the injection attack to a less harmful jamming attack. Secondly, by taking a game-theoretic approach we evaluate the optimal strategies available to the legitimate users in the presence of reactive jammers.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号