نتایج جستجو برای: resilient capacity
تعداد نتایج: 291825 فیلتر نتایج به سال:
Flood risk in deltaic regions is increasing due to a combination of more economic activities and an increase flooding probability [...]
The capacity of bacteria for degrading dissolved organic nitrogen (DON) and remineralising ammonium is of importance for marine ecosystems, as nitrogen availability frequently limits productivity. Here, we assess the capacity of a widely distributed and metabolically versatile marine bacterium to degrade phytoplankton-derived dissolved organic carbon (DOC) and nitrogen. To achieve this, we lyse...
The erosion of biocomplexity in the Tisza River Basin developed slowly and incrementally over the past 130 years since implementation of the original Vásárhelyi river engineering plan. The Hungarian public view, blinded by flood and toxic spill catastrophes, missed the slow and subtle changes to natural, social and human capital precipitated by the reshaping of the TRB landscape and its agricul...
In recent years, many leakage-resilient schemes have been published. These schemes guarantee security against side-channel attacks given bounded leakage of the underlying primitive. However, it is a challenging task to reliably determine these leakage bounds from physical properties. In this work, we present a novel approach to find reliable leakage bounds for side channels of cryptographic imp...
INTRODUCTION Differences between the tooth and implant response to load can lead to many biological and technical implications in the conditions of occlusal forces. OBJECTIVE The objective of this study was to analyze load distribution in tooth/implant-supported fixed partial dentures with the use of resilient TSA (Titan Shock Absorber, BoneCare GmbH, Augsburg, Germany) abutment and conventio...
We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols. To this end, we introduce a new primitive called leakage-resilient non-interactive key exchange (LR-NIKE) protocol. We introduce a generic security mod...
The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the adversary obtains side-channel information from the real world implementation of these algorithms. Most of the prior works on leakage-resilient cryptography consider leakage models where the adversary has access to the leakage oracle before the challenge-ciphertext is generated (befor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید
