close
1.

図書

図書
Maxim Ryadnov
出版情報: Cambridge : RSC Publishing, c2009  ix, 238 p. ; 24 cm
シリーズ名: RSC nanoscience & nanotechnology ; no.7
所蔵情報: loading…
目次情報: 続きを見る
Introductory Notes / Chapter 1:
Inspiring Hierarchical / 1.1:
Encoding Instructive / 1.2:
Starting Lowest / 1.3:
Picturing Biological / 1.4:
References
Recycling Hereditary / Chapter 2:
Coding Dual / 2.1:
Deoxyribonucleic / 2.1.1:
Building up in Two / 2.1.1.1:
Keeping in Shape / 2.1.1.2:
Priming Topological / 2.1.2:
Resequencing Basic / 2.1.2.1:
Choosing the Fittest / 2.1.2.1.1:
Evolving Diverse / 2.1.2.1.2:
Primary Motifs / 2.1.2.2:
Gluing Universal / 2.1.2.2.1:
Alienating Axial / 2.1.2.2.2:
Fixing Spatial / 2.2:
Hinting Geometric: Secondary Motifs / 2.2.1:
Crossing Double / 2.2.1.1:
Reporting Visible / 2.2.1.1.1:
Translating Symmetrical / 2.2.1.1.2:
Extending Cohesive / 2.2.1.2:
Sharing Mutual / 2.2.1.2.1:
Multiplying Traversal / 2.2.1.2.2:
Tiling Square / 2.2.1.2.3:
Scaffolding Algorithmic / 2.3:
Pursuing Autonomous / 2.3.1:
Lengthening to Shorten / 2.3.1.1:
Gathering to Limit / 2.3.1.2:
Assigning Arbitrary / 2.3.2:
Synchronising Local / 2.3.2.1:
Prescribing General / 2.3.2.2:
Adding up to Third / 2.3.3:
Wrapping to Shut / 2.3.3.1:
Framing to Classify / 2.3.3.2:
Outlook / 2.4:
Recaging Within / Chapter 3:
Enclosing to Deliver / 3.1:
Transporting Foreign / 3.1.1:
Fitting Flat and Straight / 3.1.1.1:
Spiralling Along / 3.1.1.2:
Packing Out and In / 3.1.2:
Spooling Around / 3.1.2.1:
Tunnelling Through
Escaping Walled / 3.1.3:
Capturing On and Off / 3.1.3.1:
Storing Exchangeable / 3.1.3.2:
Reacting Nano / 3.2:
Clustering Spherical / 3.2.1:
Contriving Consistent / 3.2.1.1:
Scaling Hosting / 3.2.1.2:
Following Linear / 3.2.2:
Channelling Inner
Converting Outer
Repairing from Inside / 3.3:
Uninviting Levy / 3.3.1:
Necessitating Exterior / 3.3.2:
Antagonising Dressing / 3.3.2.1:
Renting Occasional / 3.3.2.1.2:
Phasing West / 3.3.2.2:
Facing Concentric / 3.3.2.2.1:
Encircling Between / 3.3.2.2.2:
Singling Out Unique / 3.3.2.2.3:
Sharing the Balance / 3.3.3:
Driving Symmetrical / 3.3.3.1:
Sealing Annular / 3.3.3.2:
Reassembling Multiple / 3.4:
Keeping All in Touch / 4.1:
Unravelling the Essential / 4.1.1:
Winding Three in One / 4.1.1.1:
Aligning Stagger / 4.1.1.2:
Tapering Polar / 4.1.1.3:
Branching and Stretching / 4.1.1.4:
Replicating Apparent / 4.1.2:
Scraping Refusal / 4.1.2.1:
Tempting Compatible / 4.1.2.2:
Likening Synthetic / 4.1.2.3:
Recovering Intelligent / 4.1.2.4:
Restoring Available / 4.2:
Prompting Longitudinal / 4.2.1:
Invoking Granted / 4.2.1.1:
Reposing Modular / 4.3:
Displacing Coil / 4.3.1:
Settling Lateral / 4.3.2:
Bundling Exclusive / 4.3.2.1:
Permitting Distinctive / 4.3.2.2:
Inviting Captive / 4.3.2.3:
Clearing Limiting / 4.3.3:
Equilibrating Transitional / 4.3.3.1:
Extracting Minimal / 4.3.3.2:
Gambling Beyond / 4.4:
Guiding Proliferative / 4.4.1:
Feeding Proximate / 4.4.1.1:
Rooting Renewal / 4.4.1.2:
Accepting Inescapable / 4.4.2:
Patterning Positional / 4.4.2.1:
Relating Interfacial / 4.4.2.2:
Grafting Integral / 4.4.2.3:
Concluding Remarks / 4.5:
Learning Fluent / 5.1:
Parsing Semantic / 5.2:
Drawing Pragmatic / 5.3:
Revealing Contributory / Chapter 6:
Subject Index
Introductory Notes / Chapter 1:
Inspiring Hierarchical / 1.1:
Encoding Instructive / 1.2:
2.

図書

図書
Karl Pfleger, Hans H. Maurer, Armin Weber
出版情報: Weinheim : Wiley-VCH, c2007  2 v. ; 29 cm
所蔵情報: loading…
目次情報: 続きを見る
(Methods, Tables) / Volume 1:
Methods
Introduction / 1:
Experimental Section / 2:
Origin and choice of samples / 2.1:
Sample preparation / 2.2:
Standard extraction procedures / 2.2.1:
Standard liquid-liquid extraction (LLE) for plasma, urine or gastric contents (P, U, G) / 2.2.1.1:
STA procedure (hydrolysis, extraction and microwave-assisted acetylation) for urine (U+UHYAC) / 2.2.1.2:
Extraction of urine after cleavage of conjugates by glucuronidase and arylsulfatase (UGLUC) / 2.2.1.3:
Extractive methylation procedure for urine or plasma (UME, PME) / 2.2.1.4:
Solid-phase extraction for plasma or urine (PSPE, USPE) / 2.2.1.5:
LLE of plasma for determination of drugs for brain death diagnosis / 2.2.1.6:
Extraction of ethylene glycol and other glycols from plasma or urine followed by microwave-assisted pivalylation (PEGPIV or UEGPIV) / 2.2.1.7:
Derivatization procedures / 2.2.2:
Acetylation (AC) / 2.2.2.1:
Methylation (ME) / 2.2.2.2:
Ethylation (ET) / 2.2.2.3:
tert.-Butyldimethylsilylation (TBDMS) / 2.2.2.4:
Trimethylsilylation (TMS) / 2.2.2.5:
Trimethylsilylation followed by trifluoroacetylation (TMSTFA) / 2.2.2.6:
Trifluoroacetylation (TFA) / 2.2.2.7:
Pentafluoropropionylation (PFP) / 2.2.2.8:
Pentafluoropropylation (PFPOL) / 2.2.2.9:
Heptafluorobutyrylation (HFB) / 2.2.2.10:
Pivalylation (PIV) / 2.2.2.11:
Heptafluorobutyrylprolylation (HFBP) / 2.2.2.12:
GC-MS Apparatus / 2.3:
Apparatus and operation conditions / 2.3.1:
Quality assurance of the apparatus performance / 2.3.2:
Determination of retention indices / 2.4:
Systematic toxicological analysis (STA) of several classes of drugs and their metabolites by GC-MS / 2.5:
Screening for 200 drugs in blood plasma after LLE / 2.5.1:
Screening for most of the basic and neutral drugs in urine after acid hydrolysis, LLE and acetylation / 2.5.2:
Systematic toxicological analysis procedures for the detection of acidic drugs and/or their metabolites / 2.5.3:
General screening procedure for zwitterionic compounds after SPE and silylation / 2.5.4:
Application of the electronic version of this handbook / 2.6:
Quantitative determination / 2.7:
Correlation between Structure and Fragmentation / 3:
Principle of electron-ionization mass spectrometry (EI-MS) / 3.1:
Correlation between fundamental structures or side chains and fragment ions / 3.2:
Formation of Artifacts / 4:
Artifacts formed by oxidation during extraction with diethyl ether / 4.1:
N-Oxidation of tertiary amines / 4.1.1:
S-Oxidation of phenothiazines / 4.1.2:
Artifacts formed by thermolysis during GC (GC artifact) / 4.2:
Decarboxylation of carboxylic acids / 4.2.1:
Cope elimination of N-oxides (-(CH3)2NOH, -(C2H5)2NOH, -C6H14N2O2) / 4.2.2:
Rearrangement of bis-deethyl flurazepam (-H2O) / 4.2.3:
Elimination of various residues / 4.2.4:
Methylation of carboxylic acids in methanol ((ME), ME in methanol) / 4.2.5:
Formation of formaldehyde adducts using methanol as solvent (GC artifact in methanol) / 4.2.6:
Artifacts formed by thermolysis during GC and during acid hydrolysis (GC artifact, HY artifact) / 4.3:
Dehydration of alcohols (-H2O) / 4.3.1:
Decarbamoylation of carbamates / 4.3.2:
Cleavage of morazone to phenmetrazine / 4.3.3:
Artifacts formed during acid hydrolysis / 4.4:
Cleavage of the ether bridge in beta-blockers and alkanolamine antihistamines (HY) / 4.4.1:
Cleavage of 1,4-benzodiazepines to aminobenzoyl derivatives (HY) / 4.4.2:
Cleavage and rearrangement of N-demethyl metabolites of clobazam to benzimidazole derivatives (HY) / 4.4.3:
Cleavage and rearrangement of bis-deethyl flurazepam (HY -H2O) / 4.4.4:
Cleavage and rearrangement of tetrazepam / 4.4.5:
(Methods, Tables) / Volume 1:
Methods
Introduction / 1:
3.

図書

図書
authors, G. Guelachvili, K.Narahari Rao ; editor, G. Guelachvili
出版情報: Berlin ; Tokyo : Springer, c2000  LXXVII, 229 p. ; 28 cm
シリーズ名: Landolt-Börnstein Zahlenwerte und Funktionen aus Naturwissenschaften und Technik, Neue Serie / Gesamtherausgabe, K.-H. Hellwege ; New Series, Group 2 . Molecules and radicals ; v. 20 . Molecular constans : mostly from infrared spectroscopy ; subv. B5
所蔵情報: loading…
目次情報: 続きを見る
CS2 (SCS).
CS2+ (SCS+).
CS2++ (SCS++).
CSe2 (SeCSe).
C2N (CCN).
C2N (CNC).
C2N+ (CCN+).
C2N+ (CNC+).
CS2 (SCS).
CS2+ (SCS+).
CS2++ (SCS++).
4.

図書

図書
Corneliu Constantinescu
出版情報: Amsterdam : Elsevier, 2001  xxi, 597 p. ; 23 cm
シリーズ名: North-Holland mathematical library ; v. 59 . C*-algebras / Corneliu Constantinescu ; v. 2
所蔵情報: loading…
目次情報: 続きを見る
Introduction
Banach Algebras / 2:
Algebras / 2.1:
General Results / 2.1.1:
Invertible Elements / 2.1.2:
The Spectrum / 2.1.3:
Standard Examples / 2.1.4:
Complexification of Algebras / 2.1.5:
Exercises
Normed Algebras / 2.2:
The Standard Examples / 2.2.1:
The Exponential Function and the Neumann Series / 2.2.3:
Invertible Elements of Unital Banach Algebras / 2.2.4:
The Theorems of Riesz and Gelfand / 2.2.5:
Poles of Resolvents / 2.2.6:
Modules / 2.2.7:
Involutive Banach Algebras / 2.3:
Involutive Algebras / 2.3.1:
Sesquilinear Forms / 2.3.2:
Positive Linear Forms / 2.3.4:
The State Space / 2.3.5:
Involutive Modules / 2.3.6:
Gelfand Algebras / 2.4:
The Gelfand Transform / 2.4.1:
Involutive Gelfand Algebras / 2.4.2:
Examples / 2.4.3:
Locally Compact Additive Groups / 2.4.4:
The Fourier Transform / 2.4.5:
Compact Operators / 3:
The General Theory / 3.1:
Fredholm Operators / 3.1.1:
Point Spectrum / 3.1.4:
Spectrum of a Compact Operator / 3.1.5:
Integral Operators / 3.1.6:
Linear Differential Equations / 3.2:
Boundary Value Problems for Differential Equations / 3.2.1:
Supplementary Results / 3.2.2:
Linear Partial Differential Equations / 3.2.3:
Name
Index Subject
Index Symbol
Index
Introduction
Banach Algebras / 2:
Algebras / 2.1:
5.

電子ブック

EB
Kim-Kwang Raymond Choo
出版情報: Springer eBooks Computer Science , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
Computer Security Approach / 1.2.1:
Computational Complexity Approach / 1.2.2:
Research Objectives and Deliverables / 1.2.3:
Structure of Book and Contributions to Knowledge / 1.3:
References
Background Materials / 2:
Mathematical Background / 2.1:
Abstract Algebra and the Main Groups / 2.1.1:
Bilinear Maps from Elliptic Curve Pairings / 2.1.2:
Computational Problems and Assumptions / 2.1.3:
Cryptographic Tools / 2.1.4:
Encryption Schemes: Asymmetric Setting / 2.1.4.1:
Encryption Schemes: Symmetric Setting / 2.1.4.2:
Digital Signature Schemes / 2.1.4.3:
Message Authentication Codes / 2.1.4.4:
Cryptographic Hash Functions / 2.1.4.5:
Random Oracles / 2.1.4.6:
Key Establishment Protocols and their Basis / 2.2:
Protocol Architectures / 2.2.1:
Existing Cryptographic Keys / 2.2.1.1:
Method of Session Key Generation / 2.2.1.2:
Number of Entities / 2.2.1.3:
Protocol Goals and Attacks / 2.2.2:
Protocol Goals / 2.2.2.1:
Additional Security Attributes / 2.2.2.2:
Types of Attacks / 2.2.2.3:
A Need for Rigorous Treatment / 2.2.2.4:
The Computational Complexity Approach / 2.3:
Adversarial Powers / 2.3.1:
Definition of Freshness / 2.3.2:
Definition of Security / 2.3.3:
The Bellare-Rogaway Models / 2.3.4:
The BR93 Model / 2.3.4.1:
The BR95 Model / 2.3.4.2:
The BPR2000 Model / 2.3.4.3:
The Canetti-Krawczyk Model / 2.3.5:
Protocol Security / 2.3.6:
Summary / 2.4:
A Flawed BR95 Partnership Function / 3:
A Flaw in the Security Proof for 3PKD Protocol / 3.1:
The 3PKD Protocol / 3.1.1:
Key Replicating Attack on 3PKD Protocol / 3.1.2:
The Partner Function used in the BR95 Proof / 3.1.3:
A Revised 3PKD Protocol in Bellare-Rogaway Model / 3.2:
Defining SIDs in the 3PKD Protocol / 3.2.1:
An Improved Provably Secure 3PKD Protocol / 3.2.2:
Security Proof for the Improved 3PKD Protocol / 3.2.3:
Adaptive MAC Forger F / 3.2.3.1:
Multiple Eavesdropper Attacker ME / 3.2.3.2:
Conclusion of Proof / 3.2.3.3:
On The Key Sharing Requirement / 3.3:
Bellare-Rogaway 3PKD Protocol in CK2001 Model / 4.1:
New Attack on 3PKD Protocol / 4.1.1:
A New Provably-Secure 3PKD Protocol in CK2001 Model / 4.1.3:
Jeong-Katz-Lee Protocol JP2 / 4.2:
Protocol JP2 / 4.2.1:
New Attack on Protocol JP2 / 4.2.2:
An Improved Protocol JP2 / 4.2.3:
The Key Sharing Requirement / 4.3:
Comparison of Bellare-Rogaway and Canetti-Krawczyk Models / 4.4:
Relating The Notions of Security / 5.1:
Proving BR93 (EA+KE) to BPR2000 (EA+KE) / 5.1.1:
Proof for the key establishment goal / 5.1.1.1:
Proof for the entity authentication goal / 5.1.1.2:
Proving CK2001 to BPR2000 (KE) / 5.1.2:
Proving CK2001 to BR93 (KE) / 5.1.3:
BR93 (KE) to BR95 and BR93 (KE), CK2001 [not left arrow] BR95 / 5.1.4:
BR93 (KE)/CK2001 [not left arrow] BPR2000 (KE) / 5.1.5:
CK2001 [not left arrow] BR93 (EA+KE) / 5.1.6:
BR93 (KE) [not left arrow] CK2001 / 5.1.7:
BPR200 (KE) [not left arrow] BR95 / 5.1.8:
A Drawback in the BPR2000 Model / 5.2:
Case Study: Abdalla-Pointcheval 3PAKE / 5.2.1:
Unknown Key Share Attack on 3PAKE / 5.2.2:
An Extension to the Bellare-Rogaway Model / 5.3:
A Provably-Secure Revised Protocol of Boyd / 6.1:
Secure Authenticated Encryption Schemes / 6.1.1:
Revised Protocol of Boyd / 6.1.2:
Security Proof / 6.1.3:
Integrity attacker / 6.1.3.1:
Confidentiality attacker / 6.1.3.2:
Conclusion of Security Proof / 6.1.3.3:
An Extension to the BR93 Model / 6.2:
An Efficient Protocol in Extended Model / 6.3:
An Efficient Protocol / 6.3.1:
Integrity Breaker / 6.3.2:
Confidentiality Breaker / 6.3.2.2:
Comparative Security and Efficiency / 6.3.2.3:
A Proof of Revised Yahalom Protocol / 6.5:
The Yahalom Protocol and its Simplified Version / 7.1:
A New Provably-Secure Protocol / 7.2:
Proof for Protocol 7.2 / 7.2.1:
Conclusion of Proof for Theorem 7.2.1 / 7.2.1.1:
An Extension to Protocol 7.2 / 7.2.2:
Partnering Mechanism: A Brief Discussion / 7.3:
Errors in Computational Complexity Proofs for Protocols / 7.4:
Boyd-Gonzalez Nieto Protocol / 8.1:
Unknown Key Share Attack on Protocol / 8.1.1:
An Improved Conference Key Agreement Protocol / 8.1.2:
Limitations of Existing Proof / 8.1.3:
Jakobsson-Pointcheval MAKEP / 8.2:
Unknown Key Share Attack on JP-MAKEP / 8.2.1:
Flaws in Existing Security Proof for JP-MAKEP / 8.2.2:
Wong-Chan MAKEP / 8.3:
A New Attack on WC-MAKEP / 8.3.1:
Preventing the Attack / 8.3.2:
Flaws in Existing Security Proof for WC-MAKEP / 8.3.3:
An MT-Authenticator / 8.4:
Encryption-Based MT-Authenticator / 8.4.1:
Flaw in Existing Security Proof Revealed / 8.4.2:
Addressing the Flaw / 8.4.3:
An Example Protocol as a Case Study / 8.4.4:
On Session Key Construction / 8.5:
Chen-Kudla ID-Based Protocol / 9.1:
The ID-Based Protocol / 9.1.1:
Existing Arguments on Restriction of Reveal Query / 9.1.2:
Improved Chen-Kudla Protocol / 9.1.3:
Security Proof for Improved Chen-Kudla Protocol / 9.1.4:
McCullagh-Barreto 2P-IDAKA Protocol / 9.2:
The 2P-IDAKA Protocol / 9.2.1:
Why Reveal Query is Restricted / 9.2.2:
Errors in Existing Proof for 2P-IDAKA Protocol / 9.2.3:
Error 1 / 9.2.3.1:
Error 2 / 9.2.3.2:
Improved 2P-IDAKA Protocol / 9.2.4:
A Proposal for Session Key Construction / 9.3:
Another Case Study / 9.4:
Reflection Attack on Lee-Kim-Yoo Protocol / 9.4.1:
Complementing Computational Protocol Analysis / 9.4.2:
The Formal Framework / 10.1:
Analysing a Provably-Secure Protocol / 10.2:
Protocol Specification / 10.2.1:
Initial State of Protocol 10.1 / 10.2.1.1:
Step 1 of Protocol 10.1 / 10.2.1.2:
A Malicious State Transition / 10.2.1.3:
Protocol Analysis / 10.2.2:
Hijacking Attack / 10.2.2.1:
New Attack 1 / 10.2.2.2:
New Attack 2 / 10.2.2.3:
Analysing Another Two Protocols With Claimed Proofs of Security / 10.3:
Analysis of Protocol 10.2 / 10.3.1:
Analysis of Protocol 10.3 / 10.3.1.2:
Flaws in Refuted Proofs / 10.3.2:
A Possible Fix / 10.3.3:
Analysing Protocols with Heuristic Security Arguments / 10.4:
Case Studies / 10.4.1:
Jan-Chen Mutual Protocol / 10.4.1.1:
Yang-Shen-Shieh Protocol / 10.4.1.2:
Kim-Huh-Hwang-Lee Protocol / 10.4.1.3:
Lin-Sun-Hwang Key Protocols MDHEKE I and II / 10.4.1.4:
Yeh-Sun Key Protocol / 10.4.1.5:
Protocol Analyses / 10.4.2:
Protocol Analysis 1 / 10.4.2.1:
Protocol Analysis 2 / 10.4.2.2:
Protocol Analysis 3 / 10.4.2.3:
Protocol Analysis 4 / 10.4.2.4:
Protocol Analysis 5 / 10.4.2.5:
Protocol Analysis 6 / 10.4.2.6:
Protocol Analysis 7 / 10.4.2.7:
An Integrative Framework to Protocol Analysis and Repair / 10.5:
Case Study Protocol / 11.1:
Proposed Integrative Framework / 11.2:
Protocols Specification / 11.2.1:
Defining SIDs in Protocol 11.1 / 11.2.1.1:
Description of Goal State / 11.2.1.2:
Description of Possible Actions / 11.2.1.3:
Protocols Analysis / 11.2.2:
Protocol Repair / 11.2.3:
Conclusion and Future Work / 11.3:
Research Summary / 12.1:
Open Problems and Future Directions / 12.2:
Index
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
6.

電子ブック

EB
Kim-Kwang Raymond Choo
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
Computer Security Approach / 1.2.1:
Computational Complexity Approach / 1.2.2:
Research Objectives and Deliverables / 1.2.3:
Structure of Book and Contributions to Knowledge / 1.3:
References
Background Materials / 2:
Mathematical Background / 2.1:
Abstract Algebra and the Main Groups / 2.1.1:
Bilinear Maps from Elliptic Curve Pairings / 2.1.2:
Computational Problems and Assumptions / 2.1.3:
Cryptographic Tools / 2.1.4:
Encryption Schemes: Asymmetric Setting / 2.1.4.1:
Encryption Schemes: Symmetric Setting / 2.1.4.2:
Digital Signature Schemes / 2.1.4.3:
Message Authentication Codes / 2.1.4.4:
Cryptographic Hash Functions / 2.1.4.5:
Random Oracles / 2.1.4.6:
Key Establishment Protocols and their Basis / 2.2:
Protocol Architectures / 2.2.1:
Existing Cryptographic Keys / 2.2.1.1:
Method of Session Key Generation / 2.2.1.2:
Number of Entities / 2.2.1.3:
Protocol Goals and Attacks / 2.2.2:
Protocol Goals / 2.2.2.1:
Additional Security Attributes / 2.2.2.2:
Types of Attacks / 2.2.2.3:
A Need for Rigorous Treatment / 2.2.2.4:
The Computational Complexity Approach / 2.3:
Adversarial Powers / 2.3.1:
Definition of Freshness / 2.3.2:
Definition of Security / 2.3.3:
The Bellare-Rogaway Models / 2.3.4:
The BR93 Model / 2.3.4.1:
The BR95 Model / 2.3.4.2:
The BPR2000 Model / 2.3.4.3:
The Canetti-Krawczyk Model / 2.3.5:
Protocol Security / 2.3.6:
Summary / 2.4:
A Flawed BR95 Partnership Function / 3:
A Flaw in the Security Proof for 3PKD Protocol / 3.1:
The 3PKD Protocol / 3.1.1:
Key Replicating Attack on 3PKD Protocol / 3.1.2:
The Partner Function used in the BR95 Proof / 3.1.3:
A Revised 3PKD Protocol in Bellare-Rogaway Model / 3.2:
Defining SIDs in the 3PKD Protocol / 3.2.1:
An Improved Provably Secure 3PKD Protocol / 3.2.2:
Security Proof for the Improved 3PKD Protocol / 3.2.3:
Adaptive MAC Forger F / 3.2.3.1:
Multiple Eavesdropper Attacker ME / 3.2.3.2:
Conclusion of Proof / 3.2.3.3:
On The Key Sharing Requirement / 3.3:
Bellare-Rogaway 3PKD Protocol in CK2001 Model / 4.1:
New Attack on 3PKD Protocol / 4.1.1:
A New Provably-Secure 3PKD Protocol in CK2001 Model / 4.1.3:
Jeong-Katz-Lee Protocol JP2 / 4.2:
Protocol JP2 / 4.2.1:
New Attack on Protocol JP2 / 4.2.2:
An Improved Protocol JP2 / 4.2.3:
The Key Sharing Requirement / 4.3:
Comparison of Bellare-Rogaway and Canetti-Krawczyk Models / 4.4:
Relating The Notions of Security / 5.1:
Proving BR93 (EA+KE) to BPR2000 (EA+KE) / 5.1.1:
Proof for the key establishment goal / 5.1.1.1:
Proof for the entity authentication goal / 5.1.1.2:
Proving CK2001 to BPR2000 (KE) / 5.1.2:
Proving CK2001 to BR93 (KE) / 5.1.3:
BR93 (KE) to BR95 and BR93 (KE), CK2001 [not left arrow] BR95 / 5.1.4:
BR93 (KE)/CK2001 [not left arrow] BPR2000 (KE) / 5.1.5:
CK2001 [not left arrow] BR93 (EA+KE) / 5.1.6:
BR93 (KE) [not left arrow] CK2001 / 5.1.7:
BPR200 (KE) [not left arrow] BR95 / 5.1.8:
A Drawback in the BPR2000 Model / 5.2:
Case Study: Abdalla-Pointcheval 3PAKE / 5.2.1:
Unknown Key Share Attack on 3PAKE / 5.2.2:
An Extension to the Bellare-Rogaway Model / 5.3:
A Provably-Secure Revised Protocol of Boyd / 6.1:
Secure Authenticated Encryption Schemes / 6.1.1:
Revised Protocol of Boyd / 6.1.2:
Security Proof / 6.1.3:
Integrity attacker / 6.1.3.1:
Confidentiality attacker / 6.1.3.2:
Conclusion of Security Proof / 6.1.3.3:
An Extension to the BR93 Model / 6.2:
An Efficient Protocol in Extended Model / 6.3:
An Efficient Protocol / 6.3.1:
Integrity Breaker / 6.3.2:
Confidentiality Breaker / 6.3.2.2:
Comparative Security and Efficiency / 6.3.2.3:
A Proof of Revised Yahalom Protocol / 6.5:
The Yahalom Protocol and its Simplified Version / 7.1:
A New Provably-Secure Protocol / 7.2:
Proof for Protocol 7.2 / 7.2.1:
Conclusion of Proof for Theorem 7.2.1 / 7.2.1.1:
An Extension to Protocol 7.2 / 7.2.2:
Partnering Mechanism: A Brief Discussion / 7.3:
Errors in Computational Complexity Proofs for Protocols / 7.4:
Boyd-Gonzalez Nieto Protocol / 8.1:
Unknown Key Share Attack on Protocol / 8.1.1:
An Improved Conference Key Agreement Protocol / 8.1.2:
Limitations of Existing Proof / 8.1.3:
Jakobsson-Pointcheval MAKEP / 8.2:
Unknown Key Share Attack on JP-MAKEP / 8.2.1:
Flaws in Existing Security Proof for JP-MAKEP / 8.2.2:
Wong-Chan MAKEP / 8.3:
A New Attack on WC-MAKEP / 8.3.1:
Preventing the Attack / 8.3.2:
Flaws in Existing Security Proof for WC-MAKEP / 8.3.3:
An MT-Authenticator / 8.4:
Encryption-Based MT-Authenticator / 8.4.1:
Flaw in Existing Security Proof Revealed / 8.4.2:
Addressing the Flaw / 8.4.3:
An Example Protocol as a Case Study / 8.4.4:
On Session Key Construction / 8.5:
Chen-Kudla ID-Based Protocol / 9.1:
The ID-Based Protocol / 9.1.1:
Existing Arguments on Restriction of Reveal Query / 9.1.2:
Improved Chen-Kudla Protocol / 9.1.3:
Security Proof for Improved Chen-Kudla Protocol / 9.1.4:
McCullagh-Barreto 2P-IDAKA Protocol / 9.2:
The 2P-IDAKA Protocol / 9.2.1:
Why Reveal Query is Restricted / 9.2.2:
Errors in Existing Proof for 2P-IDAKA Protocol / 9.2.3:
Error 1 / 9.2.3.1:
Error 2 / 9.2.3.2:
Improved 2P-IDAKA Protocol / 9.2.4:
A Proposal for Session Key Construction / 9.3:
Another Case Study / 9.4:
Reflection Attack on Lee-Kim-Yoo Protocol / 9.4.1:
Complementing Computational Protocol Analysis / 9.4.2:
The Formal Framework / 10.1:
Analysing a Provably-Secure Protocol / 10.2:
Protocol Specification / 10.2.1:
Initial State of Protocol 10.1 / 10.2.1.1:
Step 1 of Protocol 10.1 / 10.2.1.2:
A Malicious State Transition / 10.2.1.3:
Protocol Analysis / 10.2.2:
Hijacking Attack / 10.2.2.1:
New Attack 1 / 10.2.2.2:
New Attack 2 / 10.2.2.3:
Analysing Another Two Protocols With Claimed Proofs of Security / 10.3:
Analysis of Protocol 10.2 / 10.3.1:
Analysis of Protocol 10.3 / 10.3.1.2:
Flaws in Refuted Proofs / 10.3.2:
A Possible Fix / 10.3.3:
Analysing Protocols with Heuristic Security Arguments / 10.4:
Case Studies / 10.4.1:
Jan-Chen Mutual Protocol / 10.4.1.1:
Yang-Shen-Shieh Protocol / 10.4.1.2:
Kim-Huh-Hwang-Lee Protocol / 10.4.1.3:
Lin-Sun-Hwang Key Protocols MDHEKE I and II / 10.4.1.4:
Yeh-Sun Key Protocol / 10.4.1.5:
Protocol Analyses / 10.4.2:
Protocol Analysis 1 / 10.4.2.1:
Protocol Analysis 2 / 10.4.2.2:
Protocol Analysis 3 / 10.4.2.3:
Protocol Analysis 4 / 10.4.2.4:
Protocol Analysis 5 / 10.4.2.5:
Protocol Analysis 6 / 10.4.2.6:
Protocol Analysis 7 / 10.4.2.7:
An Integrative Framework to Protocol Analysis and Repair / 10.5:
Case Study Protocol / 11.1:
Proposed Integrative Framework / 11.2:
Protocols Specification / 11.2.1:
Defining SIDs in Protocol 11.1 / 11.2.1.1:
Description of Goal State / 11.2.1.2:
Description of Possible Actions / 11.2.1.3:
Protocols Analysis / 11.2.2:
Protocol Repair / 11.2.3:
Conclusion and Future Work / 11.3:
Research Summary / 12.1:
Open Problems and Future Directions / 12.2:
Index
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
7.

電子ブック

EB
Isao Noda, Yukihiro Ozaki, Y Ozaki
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2004
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Introduction / 1:
Two-dimensional Spectroscopy / 1.1:
Overview of the Field / 1.2:
Generalized Two-dimensional Correlation / 1.3:
Types of Spectroscopic Probes / 1.3.1:
External Perturbations / 1.3.2:
Heterospectral Correlation / 1.4:
Universal Applicability / 1.5:
Principle of Two-dimensional Correlation Spectroscopy / 2:
Two-dimensional Correlation Spectroscopy / 2.1:
General Scheme / 2.1.1:
Type of External Perturbations / 2.1.2:
Dynamic Spectrum / 2.2:
Two-dimensional Correlation Concept / 2.2.2:
Generalized Two-dimensional Correlation Function / 2.2.3:
Properties of 2D Correlation Spectra / 2.2.4:
Synchronous 2D Correlation Spectrum / 2.3.1:
Asynchronous 2D Correlation Spectrum / 2.3.2:
Special Cases and Exceptions / 2.3.3:
Analytical Expressions for Certain 2D Spectra / 2.4:
Comparison of Linear Functions / 2.4.1:
2D Spectra Based on Sinusoidal Signals / 2.4.2:
Exponentially Decaying Intensities / 2.4.3:
Distributed Lorentzian Peaks / 2.4.4:
Signals with more Complex Waveforms / 2.4.5:
Cross-correlation Analysis and 2D Spectroscopy / 2.5:
Cross-correlation Function and Cross Spectrum / 2.5.1:
Cross-correlation Function and Synchronous Spectrum / 2.5.2:
Hilbert Transform / 2.5.3:
Orthogonal Correlation Function and Asynchronous Spectrum / 2.5.4:
Disrelation Spectrum / 2.5.5:
Practical Computation of Two-dimensional Correlation Spectra / 3:
Computation of 2D Spectra from Discrete Data / 3.1:
Synchronous Spectrum / 3.1.1:
Asynchronous Spectrum / 3.1.2:
Unevenly Spaced Data / 3.2:
Computational Efficiency / 3.3:
Generalized Two-dimensional Correlation Spectroscopy in Practice / 4:
Practical Example / 4.1:
Solvent Evaporation Study / 4.1.1:
2D Spectra Generated from Experimental Data / 4.1.2:
Sequential Order Analysis by Cross Peak Signs / 4.1.3:
Pretreatment of Data / 4.2:
Noise Reduction Methods / 4.2.1:
Baseline Correction Methods / 4.2.2:
Other Pretreatment Methods / 4.2.3:
Features Arising from Factors other than Band Intensity Changes / 4.3:
Effect of Band Position Shift and Line Shape Change / 4.3.1:
Simulation Studies / 4.3.2:
2D Spectral Features from Band Shift and Line Broadening / 4.3.3:
Further Expansion of Generalized Two-dimensional Correlation Spectroscopy - Sample-Sample Correlation and Hybrid Correlation / 5:
Sample-Sample Correlation Spectroscopy / 5.1:
Correlation in another Dimension / 5.1.1:
Matrix Algebra Outlook of 2D Correlation / 5.1.2:
Sample-Sample Correlation Spectra / 5.1.3:
Application of Sample-Sample Correlation / 5.1.4:
Hybrid 2D Correlation Spectroscopy / 5.2:
Multiple Perturbations / 5.2.1:
Correlation between Data Matrices / 5.2.2:
Case Studies / 5.2.3:
Additional Remarks / 5.3:
Additional Developments in Two-dimensional Correlation Spectroscopy - Statistical Treatments, Global Phase Maps, and Chemometrics / 6:
Classical Statistical Treatments and 2D Spectroscopy / 6.1:
Variance, Covariance, and Correlation Coefficient / 6.1.1:
Interpretation of 2D Disrelation Spectrum / 6.1.2:
Coherence and Correlation Phase Angle / 6.1.3:
Correlation Enhancement / 6.1.4:
Global 2D Phase Maps / 6.2:
Further Discussion on Global Phase / 6.2.1:
Phase Map with a Blinding Filter / 6.2.2:
Simulation Study / 6.2.3:
Chemometrics and 2D Correlation Spectroscopy / 6.3:
Comparison between Chemometrics and 2D Correlation / 6.3.1:
Factor Analysis / 6.3.2:
Principal Component Analysis (PCA) / 6.3.3:
Number of Principal Factors / 6.3.4:
PCA-reconstructed Spectra / 6.3.5:
Eigenvalue Manipulating Transformation (EMT) / 6.3.6:
Other Types of Two-dimensional Spectroscopy / 7:
Nonlinear Optical 2D Spectroscopy / 7.1:
Ultrafast Laser Pulses / 7.1.1:
Comparison with Generalized 2D Correlation Spectroscopy / 7.1.2:
Overlap Between Generalized 2D Correlation and Nonlinear Spectroscopy / 7.1.3:
Statistical 2D Correlation Spectroscopy / 7.2:
Statistical 2D Correlation by Barton II et al. / 7.2.1:
Statistical 2D Correlation by &Sa&sic and Ozaki / 7.2.2:
Other Statistical 2D Spectra / 7.2.3:
Link to Chemometrics / 7.2.4:
Other Developments in 2D Correlation Spectroscopy / 7.3:
Moving-window Correlation / 7.3.1:
Model-based 2D Correlation Spectroscopy / 7.3.2:
Dynamic Two-di / 8:
Preface
Acknowledgements
Introduction / 1:
8.

電子ブック

EB
Eric Setton, Bernd Girod
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 2:
Video Compression / 2.1:
H.264 Video Coding / 2.1.1:
Distortion Models / 2.1.2:
Video Streaming / 2.2:
Error Resilience / 2.2.1:
Congestion Control / 2.2.2:
Path Diversity / 2.2.3:
Multicast Architectures / 2.3:
IP Multicast / 2.3.1:
Content Delivery Networks / 2.3.2:
Peer-to-Peer Systems / 2.4:
Peer-to-Peer File Transfer, the Example of BitTorrent / 2.4.1:
Peer-to-Peer Streaming / 2.4.2:
Streaming over Throughput-Limited Paths / 3:
Video Encoding for Throughput-Limited Paths / 3.1:
End-to-End Rate-Distortion Performance Model / 3.1.1:
Experimental Results / 3.1.2:
Congestion-Distortion Optimized Scheduling / 3.2:
Channel Model / 3.2.1:
Evaluating a Schedule / 3.2.2:
Randomized Schedule Search / 3.2.3:
CoDiO Light / 3.2.4:
Chapter Summary / 3.2.5:
Peer-to-Peer Control Protocol / 4:
Protocol Description / 4.1:
Different Peer States / 4.1.1:
Different Tree Connection States / 4.1.2:
Multicast Source / 4.1.3:
Protocol Settings / 4.1.4:
Experimental Protocol Evaluation / 4.2:
Experimental Setup / 4.2.1:
Control Protocol Traffic Distribution / 4.2.2:
Join and Rejoin Latency / 4.2.3:
Scalability / 4.2.4:
Limiting Throughput / 4.2.5:
Video Streaming over a Peer-to-Peer Network / 4.3:
Video Streaming Protocol / 5.1:
Video Packet Transmission / 5.1.1:
Retransmissions / 5.1.2:
Peer-to-Peer CoDiO Scheduling / 5.2:
Sender-Driven Prioritization / 5.2.1:
Distortion-Optimized Retransmission Scheduling / 5.2.2:
Scheduler Evaluation / 5.2.3:
Video Sessions / 5.3:
Diversity / 5.3.2:
CoDiO P2P / 5.3.3:
Conclusions and Future Work / 5.4:
Conclusions / 6.1:
Future Work / 6.2:
Video Experiments / A:
Encoding Structures / A.1:
Latency-Constrained Video Streaming / A.1.2:
Error-Resilient Decoding / A.1.3:
Quality Metric / A.1.4:
Video Sequences / A.2:
Container / A.2.1:
Foreman / A.2.2:
Mobile / A.2.3:
Mother & Daughter / A.2.4:
News / A.2.5:
Salesman / A.2.6:
References
Index
Introduction / 1:
Background / 2:
Video Compression / 2.1:
9.

電子ブック

EB
Eric Setton, Bernd Girod
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 2:
Video Compression / 2.1:
H.264 Video Coding / 2.1.1:
Distortion Models / 2.1.2:
Video Streaming / 2.2:
Error Resilience / 2.2.1:
Congestion Control / 2.2.2:
Path Diversity / 2.2.3:
Multicast Architectures / 2.3:
IP Multicast / 2.3.1:
Content Delivery Networks / 2.3.2:
Peer-to-Peer Systems / 2.4:
Peer-to-Peer File Transfer, the Example of BitTorrent / 2.4.1:
Peer-to-Peer Streaming / 2.4.2:
Streaming over Throughput-Limited Paths / 3:
Video Encoding for Throughput-Limited Paths / 3.1:
End-to-End Rate-Distortion Performance Model / 3.1.1:
Experimental Results / 3.1.2:
Congestion-Distortion Optimized Scheduling / 3.2:
Channel Model / 3.2.1:
Evaluating a Schedule / 3.2.2:
Randomized Schedule Search / 3.2.3:
CoDiO Light / 3.2.4:
Chapter Summary / 3.2.5:
Peer-to-Peer Control Protocol / 4:
Protocol Description / 4.1:
Different Peer States / 4.1.1:
Different Tree Connection States / 4.1.2:
Multicast Source / 4.1.3:
Protocol Settings / 4.1.4:
Experimental Protocol Evaluation / 4.2:
Experimental Setup / 4.2.1:
Control Protocol Traffic Distribution / 4.2.2:
Join and Rejoin Latency / 4.2.3:
Scalability / 4.2.4:
Limiting Throughput / 4.2.5:
Video Streaming over a Peer-to-Peer Network / 4.3:
Video Streaming Protocol / 5.1:
Video Packet Transmission / 5.1.1:
Retransmissions / 5.1.2:
Peer-to-Peer CoDiO Scheduling / 5.2:
Sender-Driven Prioritization / 5.2.1:
Distortion-Optimized Retransmission Scheduling / 5.2.2:
Scheduler Evaluation / 5.2.3:
Video Sessions / 5.3:
Diversity / 5.3.2:
CoDiO P2P / 5.3.3:
Conclusions and Future Work / 5.4:
Conclusions / 6.1:
Future Work / 6.2:
Video Experiments / A:
Encoding Structures / A.1:
Latency-Constrained Video Streaming / A.1.2:
Error-Resilient Decoding / A.1.3:
Quality Metric / A.1.4:
Video Sequences / A.2:
Container / A.2.1:
Foreman / A.2.2:
Mobile / A.2.3:
Mother & Daughter / A.2.4:
News / A.2.5:
Salesman / A.2.6:
References
Index
Introduction / 1:
Background / 2:
Video Compression / 2.1:
10.

図書

図書
H. Haug ... [et al.] ; edited by C. Klingshirn
出版情報: Berlin : Springer-Verlag, c2001-2007  3 v. ; 28 cm.
シリーズ名: Landolt-Börnstein Zahlenwerte und Funktionen aus Naturwissenschaften und Technik, Neue Serie / Gesamtherausgabe, K.-H. Hellwege ; Group 3 . Condensed matter ; v. 34 . Semiconductor quantum structures ; subv. C
所蔵情報: loading…
目次情報: 続きを見る
Landolt-Börnstein
Group III: Condensed Matter
Semiconductor Quantum Structures / Volume 34:
Optical Properties (Part 2) / Subvolume C2:
Introductory material
Low-dimensional structures of II-VI compounds / 5:
General properties / H. Kalt5.1:
Introduction / 5.1.1:
Some basic properties of bulk II-VI compounds / 5.1.2:
Band-gap energies / 5.1.2.1:
Excitonic properties / 5.1.2.2:
Alignment of electronic bands / 5.1.3:
References for 5.1 / 5.1.4:
Quantum-well structures of II-VI compounds / 5.2:
(Hg,X)Te quantum wells / 5.2.1:
Low-density regime / 5.2.1.1:
Electronic states in quantum wells / 5.2.1.1.1:
Electron-hole and excitonic transitions / 5.2.1.1.2:
Modification of the optical properties by internal fields / 5.2.1.2:
Modification of the optical properties by external fields / 5.2.1.3:
High-density regime and nonlinear optics / 5.2.1.4:
References for 5.2.1 / 5.2.1.5:
CdTe quantum wells / 5.2.2:
Excitonic transitions / 5.2.2.1:
Localized excitons / 5.2.2.1.3:
Polariton effects / 5.2.2.1.4:
Strained quantum wells / 5.2.2.2:
Piezoelectric quantum wells / 5.2.2.2.2:
Hydrostatic pressure / 5.2.2.3:
External electric fields / 5.2.2.3.2:
External magnetic fields / 5.2.2.3.3:
The intermediate-density regime / 5.2.2.4:
Exciton-exciton interaction / 5.2.2.4.1:
Excitonic lasing and optical gain / 5.2.2.4.2:
Biexcitons / 5.2.2.4.3:
The high-density regime / 5.2.2.5:
One-component plasma (2DEG) / 5.2.2.5.1:
Electron-hole plasma / 5.2.2.5.2:
Coherent dynamics and relaxation of optical excitations / 5.2.2.6:
Coherent interactions / 5.2.2.6.1:
Dephasing mechanisms and homogeneous linewidth / 5.2.2.6.2:
Relaxation processes / 5.2.2.6.3:
Transport phenomena of excitons and trions / 5.2.2.6.4:
Radiative and nonradiative recombination / 5.2.2.6.5:
References for 5.2.2 / 5.2.2.7:
(Cd,Zn)Te, (Cd,Mn)Te, and (Cd,Mg)Te quantum wells / 5.2.3:
The intermediate and high-density regimes / 5.2.3.1:
References for 5.2.3 / 5.2.3.4:
ZnTe quantum wells / 5.2.4:
Excitons and polaritons / 5.2.4.1:
Optical nonlinearities and high-density effects / 5.2.4.3:
References for 5.2.4 / 5.2.4.4:
Telluride diluted-magnetic semiconductor quantum-well structures: (Hg,Mn)Te, (Cd,Mn)Te, and (Zn,Mn)Te QWs; Se/Te type-II QWs / 5.2.5:
Zeeman splitting and its applications / 5.2.5.1:
Giant Zeeman splitting / 5.2.5.1.1:
Magnetic-field induced type-I to type-II transition / 5.2.5.1.2:
Interface effects in non-DMS/DMS QW structures / 5.2.5.1.3:
Magnetic-field induced circular birefringence / 5.2.5.1.4:
Coulomb-bound electron-hole pairs and complexes (low-density regime) / 5.2.5.2:
Magnetic polarons / 5.2.5.2.1:
Donor-acceptor pair recombination / 5.2.5.2.3:
The intermediate and high-density regime / 5.2.5.3:
Spin-aligned excitons / 5.2.5.3.1:
Spin-aligned magnetoplasma / 5.2.5.3.2:
Two-dimensional electron or hole gas / 5.2.5.3.3:
Coherent spin dynamics and spin injection / 5.2.5.4:
Spin relaxation / 5.2.5.4.2:
Exciton dephasing and homogeneous broadening / 5.2.5.4.3:
Formation dynamics of magnetic polarons / 5.2.5.4.4:
Recombination processes / 5.2.5.4.5:
References for 5.2.5 / 5.2.5.5:
Telluride/Selenide quantum wells / 5.2.6:
High-density regime and dynamics / 5.2.6.1:
References for 5.2.6 / 5.2.6.3:
HgSe and (Hg,Cd)Se quantum wells / 5.2.7:
References for 5.2.7
CdSe quantum wells / 5.2.8:
High-density regime / 5.2.8.1:
Relaxation dynamics / 5.2.8.3:
References for 5.2.8 / 5.2.8.4:
(Cd,Zn)Se quantum wells / 5.2.9:
Modifications of the optical properties by internal fields / 5.2.9.1:
Piezoelectric fields / 5.2.9.2.1:
Modifications of the optical properties by external fields / 5.2.9.3:
Excitonic interactions and Pauli blocking / 5.2.9.3.1:
Two-photon absorption and second harmonic generation / 5.2.9.4.2:
Localized biexcitons / 5.2.9.4.3:
Excitonic and biexcitonic stimulated emission and optical gain / 5.2.9.4.4:
Fermi-edge singularity / 5.2.9.5:
Correlated electron-hole plasma / 5.2.9.5.2:
Coherent interactions and dephasing / 5.2.9.6:
Transport phenomena / 5.2.9.6.2:
Dynamics of gain and stimulated emission / 5.2.9.6.4:
Radiative and non-radiative recombination / 5.2.9.6.5:
References for 5.2.9 / 5.2.9.7:
ZnSe quantum wells / 5.2.10:
Strain and piezoelectric fields / 5.2.10.1:
Transient internal space charge fields / 5.2.10.2.2:
Electric fields / 5.2.10.3:
Magnetic fields / 5.2.10.3.3:
Excitonic gain and lasing / 5.2.10.4:
Nonlinear optical effects / 5.2.10.4.4:
Optical gain and lasing / 5.2.10.5:
Hot-exciton relaxation / 5.2.10.6:
Lateral transport / 5.2.10.6.4:
References for 5.2.10 / 5.2.10.6.6:
Selenide-based quantum wells containing Be, Mg, or S in the well / 5.2.11:
References for 5.2.11
Selenide diluted-magnetic semiconductor quantum-well structures: (Cd,Mn)Se, (Zn,Mn)Se, and (Zn,Fe)Se QWs / 5.2.12:
Two-dimensional electron gas / 5.2.12.1:
Spin dephasing and relaxation / 5.2.12.4:
Dynamics of magnetic polarons / 5.2.12.4.2:
References for 5.2.12 / 5.2.12.4.3:
Zincblende Sulphide/Selenide type-II quantum wells / 5.2.13:
References for 5.2.13
CdS/ZnS and (Cd,Zn)S/ZnS quantum wells / 5.2.14:
Intermediate and high-density regime / 5.2.14.1:
Exciton dynamics / 5.2.14.4:
References for 5.2.14 / 5.2.14.5:
ZnS/(Zn,Mg)S quantum wells / 5.2.15:
References for 5.2.15
ZnO and (Zn,Cd)O quantum wells / 5.2.16:
Dynamics of optical excitations / 5.2.16.1:
References for 5.2.16 / 5.2.16.5:
Superlattices and coupled quantum-well structures of II-VI compounds / 5.3:
(Hg,X)Te superlattices / 5.3.1:
Electronic states in superlattices / 5.3.1.1:
References for 5.3.1 / 5.3.1.1.2:
CdTe/(Cd,X)Te and (Cd,X)Te/ZnTe superlattices and coupled quantum wells / 5.3.2:
Transient effects and dynamics / 5.3.2.1:
References for 5.3.2 / 5.3.2.5:
Telluride diluted magnetic semiconductor superlattices and coupled quantum wells / 5.3.3:
Electronic states in DMS SLs / 5.3.3.1:
Spin states in DMS SLs / 5.3.3.2:
Polaritons / 5.3.3.3:
Dynamic processes / 5.3.3.5:
References for 5.3.3 / 5.3.3.6:
Telluride/Selenide and Telluride/Sulphide superlattices / 5.3.4:
Electronic states in type-II SLs / 5.3.4.1:
Excitons and isoelectronic traps / 5.3.4.2:
High-excitation regime / 5.3.4.3:
References for 5.3.4 / 5.3.4.5:
CdSe, ZnSe, (Cd,Zn)Se, and (Zn,Mg)(S,Se) superlattices and coupled quantum wells / 5.3.5:
Electronic states in strained-layer superlattices / 5.3.5.1:
Optical functions in superlattices and multiple quantum wells / 5.3.5.1.2:
Magnetic field / 5.3.5.1.3:
References for 5.3.5 / 5.3.5.4:
Selenide DMS superlattices and coupled quantum wells / 5.3.6:
Electronic states in diluted magnetic semiconductor superlattices (DMS SLs) / 5.3.6.1:
Spin-relaxation and spin injection / 5.3.6.1.2:
References for 5.3.6 / 5.3.6.3:
CdSe/CdS and CdS/ZnSe intrinsic Stark superlattices / 5.3.7:
References for 5.3.7 / 5.3.7.1:
Zincblende Sulphide/Selenide superlattices / 5.3.8:
References for 5.3.8
CdS/ZnS, CdS/(Cd,ZnS), and (Cd,Zn)S/ZnS superlattices / 5.3.9:
References for 5.3.9
Quantum-wire structures / 5.4:
Telluride quantum wires / 5.4.1:
Selenide quantum wires / 5.4.1.1:
Electron-phonon coupling / 5.4.2.1:
Optical gain / 5.4.2.1.3:
Exciton recombination / 5.4.2.3:
Sulfide quantum wires / 5.4.3:
Oxide quantum wires / 5.4.4:
Semimagnetic quantum wires / 5.4.5:
Mn-related transitions / 5.4.5.1:
Magneto-optics / 5.4.5.2:
References for 5.4 / 5.4.6:
II-VI Quantum dots I - Nanocrystals / U. Woggon ; S.V. Gaponenko5.5:
HgTe / 5.5.1:
CdTe / 5.5.2:
The low-density regime / 5.5.2.1:
Size-dependent energy states / 5.5.2.1.1:
Splitting of states / 5.5.2.1.2:
Interaction with phonons / 5.5.2.1.3:
Impurity states / 5.5.2.1.4:
Coherent dynamics, relaxation and recombination of optical excitations / 5.5.2.2:
Dot-dot interactions, quantum dot arrays / 5.5.2.5:
(Cd,Hg)Te / 5.5.3:
Cd(Te,Se) and Cd(Te,S) / 5.5.4:
ZnTe / 5.5.5:
HgSe / 5.5.6:
CdSe / 5.5.7:
Biexciton states / 5.5.7.1:
Nonlinear optical coefficients / 5.5.7.2.2:
Stimulated emission and optical gain / 5.5.7.2.3:
Dephasing times and homogeneous linewidth / 5.5.7.3:
Cd(Se,S) / 5.5.7.4.2:
(Cd,Mn)Se / 5.5.8.1:
(Cd,Zn)Se / 5.5.10:
ZnSe / 5.5.11:
HgS / 5.5.11.1:
CdS / 5.5.13:
Nonlinear-optical coefficients / 5.5.13.1:
(Zn,Cd)S / 5.5.13.2.3:
(Zn,Mn)S / 5.5.15:
ZnS / 5.5.16:
CdO / 5.5.16.1:
ZnO / 5.5.18:
References for 5.5 / 5.5.18.1:
II-VI Quantum dots II - Self-organized, epitaxially grown nanostructures / 5.6:
Excitonic states and their fine structure / 5.6.1:
Charged excitons / 5.6.2.1.2:
(Cd,Mn)Te, (Cd,Mg)Te / 5.6.2.1.3:
CdSe and ZnCdSe / 5.6.4:
References for 5.6 / 5.6.6.1:
Landolt-Börnstein
Group III: Condensed Matter
Semiconductor Quantum Structures / Volume 34:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼