搜索结果: 1-15 共查到“知识库 Protection”相关记录369条 . 查询时间(0.062 秒)
Forest Disturbances in Polish Tatra Mountains for 1985–2016 in Relation to Topography, Stand Features, and Protection Zone
changes GIS mountains remote sensing terrain stands
2024/1/23
For more than four centuries, the Tatra Mountains were affected by many factors, such as forest and pastoral management, mining and metallurgy, windthrows, snow avalanches, and bark beetle outbreaks. ...
Controlled Preparation of MgAl-Layered Double Hydroxide/Graphene Hybrids and Their Applications for Metal Protection
MgAl-Layered Double Hydroxide Graphene Hybrids
2023/6/21
The ion-conductive nature of layered double hydroxides (LDHs) and poor dispersibility of graphene are considered to be vital problems that limit their applications in the field of metal protection. Th...
Partially dehydrated zinc hydroxide sulfate nanoplates reinforced coating for corrosion protection
Zinc hydroxide sulfate Dehydration Crystal phase transition Active barrier Synergistic effect
2023/6/21
In this work, partially dehydrated zinc hydroxide sulfate nanoplates are synthesized by facile chemical bath deposition together with subsequent heat dehydration. The nanoplates exhibit well-defined h...
张生:Protection of Foreign Investment in China: The Foreign Investment Law and the Changing Landscape
China Foreign Foreign Investment
2023/8/9
雷速公司共建数据
China’s foreign investment law regime has experienced significant changes in recent years. A milestone came with the passing of the Foreign Investment Law (FIL) in 2019, replacing the laws and regulat...
Effect of tea root-derived proanthocyanidin fractions on protection of dentin collagen
tea root-derived proanthocyanidin dentin collagen
2023/4/20
Objectives: Proanthocyanidins (PAs) have been widely used as effective agents for dentin collagen cross-linking to enhance the biomechanics and biostability of dentin in vitro. However, the effects an...
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
Compromised Platforms control systems
2019/7/31
Security and safety-critical remote applications such as e-voting, online banking, industrial control systems, medical devices, and home automation systems rely upon user interaction that is typically...
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
CRAFT block cipher tweakable
2019/2/28
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryp...
(R)CCA Secure Updatable Encryption with Integrity Protection
updatable encryption integrity, key rotation ciphertext-independence
2019/2/28
An updatable encryption scheme allows a data host to update ciphertexts of a client from an old to a new key, given so-called update tokens from the client. Rotation of the encryption key is a common ...
nQUIC: Noise-Based QUIC Packet Protection
UDP QUIC SSL
2019/1/16
We present nQUIC, a variant of QUIC-TLS that uses the Noise protocol framework for its key exchange and basis of its packet protector with no semantic transport changes. nQUIC is designed for deployme...
Automated software protection for the masses against side-channel attacks
Side-channel attack hiding polymorphism
2018/12/19
We present an approach and a tool to answer the need for effective, generic and easily applicable protections against side-channel attacks. The protection mechanism is based on code polymorphism, so t...
Curcumin offers antioxidant protection to cryopreserved bovine semen
bulls Curcuma longa cryopreservation oxidative stress spermatozoa
2018/11/23
Evidence shows that oxidative stress associated with sperm cryopreservation may lead to a significant decrease of the structural integrity and functional activity of male gametes. Curcumin (CUR) has b...
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT
RFID IoT Secret disclosure
2018/5/2
The designers of Radio-Frequency IDentification (RFID) systems have a challenging task for proposing secure mutual authentication protocols for Internet of Things (IoT) applications. Recently, Fan et ...
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
Cryptography authenticated cipher field programmable gate array
2018/4/17
Authenticated ciphers, like all physical implementations of cryptography, are vulnerable to side-channel attacks, including differential power analysis (DPA). The t-test leakage detection methodology ...
DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models
MLP CNNs
2018/4/4
This paper proposes DeepSigns, a novel end-to-end framework for systematic Watermarking and Intellectual Property (IP) protection in the context of deep learning. DeepSigns, for the first time, introd...
INTEGRATED PHOTOGRAMMETRIC SURVEY AND BIM MODELLING FOR THE PROTECTION OF SCHOOL HERITAGE, APPLICATIONS ON A CASE STUDY
Photo-modelling HBIM Knowledge modelling Survey of historical building
2018/6/4
The contribution, considering the use of low-cost photogrammetric detection methodologies and the use of asset Historical-BIM, has as its aim the theme of knowledge and the adaptation of safety in sch...