>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到知识库 Protection相关记录369条 . 查询时间(0.062 秒)
For more than four centuries, the Tatra Mountains were affected by many factors, such as forest and pastoral management, mining and metallurgy, windthrows, snow avalanches, and bark beetle outbreaks. ...
The ion-conductive nature of layered double hydroxides (LDHs) and poor dispersibility of graphene are considered to be vital problems that limit their applications in the field of metal protection. Th...
In this work, partially dehydrated zinc hydroxide sulfate nanoplates are synthesized by facile chemical bath deposition together with subsequent heat dehydration. The nanoplates exhibit well-defined h...
China’s foreign investment law regime has experienced significant changes in recent years. A milestone came with the passing of the Foreign Investment Law (FIL) in 2019, replacing the laws and regulat...
Objectives: Proanthocyanidins (PAs) have been widely used as effective agents for dentin collagen cross-linking to enhance the biomechanics and biostability of dentin in vitro. However, the effects an...
Security and safety-critical remote applications such as e-voting, online banking, industrial control systems, medical devices, and home automation systems rely upon user interaction that is typically...
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryp...
An updatable encryption scheme allows a data host to update ciphertexts of a client from an old to a new key, given so-called update tokens from the client. Rotation of the encryption key is a common ...
nQUIC: Noise-Based QUIC Packet Protection     UDP  QUIC  SSL       2019/1/16
We present nQUIC, a variant of QUIC-TLS that uses the Noise protocol framework for its key exchange and basis of its packet protector with no semantic transport changes. nQUIC is designed for deployme...
We present an approach and a tool to answer the need for effective, generic and easily applicable protections against side-channel attacks. The protection mechanism is based on code polymorphism, so t...
Evidence shows that oxidative stress associated with sperm cryopreservation may lead to a significant decrease of the structural integrity and functional activity of male gametes. Curcumin (CUR) has b...
The designers of Radio-Frequency IDentification (RFID) systems have a challenging task for proposing secure mutual authentication protocols for Internet of Things (IoT) applications. Recently, Fan et ...
Authenticated ciphers, like all physical implementations of cryptography, are vulnerable to side-channel attacks, including differential power analysis (DPA). The t-test leakage detection methodology ...
This paper proposes DeepSigns, a novel end-to-end framework for systematic Watermarking and Intellectual Property (IP) protection in the context of deep learning. DeepSigns, for the first time, introd...
The contribution, considering the use of low-cost photogrammetric detection methodologies and the use of asset Historical-BIM, has as its aim the theme of knowledge and the adaptation of safety in sch...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...