>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到injection相关记录245条 . 查询时间(0.109 秒)
While the human world is reeling from one pandemic, ongoing epidemics are affecting crops and putting global food production at risk. Oranges, olives and bananas are under threat in many areas due to ...
近日,国际著名期刊《Journal of Hydrology》刊发了中国地质大学环境学院文章教授团队的最新研究成果——“Microbial effects on hydraulic conductivity estimation by single-well injection tests in a petroleum-contaminated aquifer”。该文第一作者为环境学院博士研究生朱...
Semi-invasive fault injection attacks, such as optical fault injection, are powerful techniques well-known by attackers and secure embedded system designers. When performing such attacks, the selectio...
Deep learning is becoming a basis of decision making systems in many application domains, such as autonomous vehicles, health systems, etc., where the risk of misclassification can lead to serious con...
The majority of currently deployed cryptographic public-key schemes are at risk of becoming insecure once large scale quantum computers become practical. Therefore, substitutes resistant to quantum at...
We present the first template-based fault injection analysis of FPGA-based block cipher implementations. While template attacks have been a popular form of side-channel analysis in the cryptographic l...
In work that offers insight into the magnitude of the hazards posed by earthquake faults in general, seismologists have developed a model to determine the size of an earthquake that could be triggered...
Order-preserving encryption (OPE) and order-revealing encryption (ORE) are among the core ingredients for encrypted database (EDB) systems as secure cloud storage. In this work, we study the leakage o...
Less than 10% of oil is usually recovered from liquid-rich shales and this leaves much room for improvement, while water injection into shale formation is virtually impossible because of the extremely...
Side channel analysis and fault attacks are two powerful methods to analyze and break cryptographic implementations. Recently, secure multiparty computation has been applied to prevent side channel at...
CO2 is now considered as a novel heat transmission fluid to extract geothermal energy. It can be used for both energy exploitation and CO2 geological sequestration. Here, a 3-D, “two-spot” pattern wel...
We point out the risks of providing security to relational databases via searchable encryption schemes by mounting a novel inference attack exploiting the structure of relational databases together wi...
Causing a device to incorrectly execute an instruction or store faulty data is well-known strategy for attacking cryptographic implementations on embedded systems. One technique to generate such fault...
We introduce secure channel injection (SCI) protocols, which allow one party to insert a private message into another party's encrypted communications. We construct an efficient SCI protocol for commu...
Software encoding countermeasures are becoming increasingly popular among researchers proposing code-level prevention against data-dependent leakage allowing an attacker to mount a side-channel attack...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...