搜索结果: 1-5 共查到“军事学 environmental”相关记录5条 . 查询时间(0.218 秒)
Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys
Malicious cryptography environmental keys rerandomization
2017/10/16
Protecting malware using encryption prevents an analyst, defending some computer(s) in the network, from analyzing the malicious code and identifying the intentions of the malware author. We discuss m...
Malware needs to execute on a target machine while simultaneously keeping its payload confidential from a malware analyst. Standard encryption can be used to ensure the confidentiality, but it does no...
Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes
Modeling Attacks Environmental Changes
2014/3/7
Physically Unclonable Functions (PUFs) are emerging as hardware security primitives. So-called strong PUFs provide a mechanism to authenticate chips which is inherently unique for every manufactured s...
This article examines the debates surrounding the concept of environmental security. Three approaches to environmental security are examined: traditional environmental security, global environmental s...
Center for Environmental Management of Military Lands at Colorado State University
环境管理 Environmental Management
2007/12/24
The Center for Environmental Management of Military Lands (CEMML) at Colorado State University is a team of environmental professionals experienced in the conservation and sustainable management of na...