標(biāo)題: Titlebook: Sustainability in the Maritime Domain; Towards Ocean Govern Angela Carpenter,Tafsir M. Johansson,Jon A. Skinne Book 2021 The Editor(s) (if [打印本頁] 作者: 懇求 時(shí)間: 2025-3-21 16:27
書目名稱Sustainability in the Maritime Domain影響因子(影響力)
書目名稱Sustainability in the Maritime Domain影響因子(影響力)學(xué)科排名
書目名稱Sustainability in the Maritime Domain網(wǎng)絡(luò)公開度
書目名稱Sustainability in the Maritime Domain網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Sustainability in the Maritime Domain被引頻次
書目名稱Sustainability in the Maritime Domain被引頻次學(xué)科排名
書目名稱Sustainability in the Maritime Domain年度引用
書目名稱Sustainability in the Maritime Domain年度引用學(xué)科排名
書目名稱Sustainability in the Maritime Domain讀者反饋
書目名稱Sustainability in the Maritime Domain讀者反饋學(xué)科排名
作者: 打火石 時(shí)間: 2025-3-21 23:05
978-3-030-69327-5The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: mosque 時(shí)間: 2025-3-22 00:58 作者: grenade 時(shí)間: 2025-3-22 05:08 作者: 廢除 時(shí)間: 2025-3-22 09:15 作者: brassy 時(shí)間: 2025-3-22 13:54
e these tools, non-standard vulnerability naming conventions, etc. make the job of a security analyst very difficult..This paper provides the first ever comprehensive comparison of smart contract vulnerability discovery tools which are available in the public domain based on a comprehensive benchmar作者: infinite 時(shí)間: 2025-3-22 19:33
Angela Carpenter,Tafsir M. Johansson,Jon A. Skinnerrtially generalize to other payment systems..We also include the perspective of merchants, as existing systems have often struggled with securing payment information at the merchant’s side. Here, challenges include avoiding database transactions for customers that do not actually go through with the作者: 取消 時(shí)間: 2025-3-23 00:48
independent of the underlying blockcipher and works on the encryption mode. In this paper, we also validate the proposed fault based forgery methodology by performing actual fault attacks by electromagnetic pulse injection which shows practicality of the proposed forgery procedure. Finally, we prov作者: Frisky 時(shí)間: 2025-3-23 02:35
Mark J. Spalding,Angelica E. Braestrup,Alexandra Refoscoults of the CIOS algorithms focuses on different security levels useful in cryptography. This architecture have been designed in order to use the flexible DSP48 on Xilinx FPGAs. Our architecture is scalable and depends only on the number and size of words. For instance, we provide results of impleme作者: arthrodesis 時(shí)間: 2025-3-23 08:29 作者: finite 時(shí)間: 2025-3-23 12:13
Ziaul Haque Munim,Rana Sahaults of the CIOS algorithms focuses on different security levels useful in cryptography. This architecture have been designed in order to use the flexible DSP48 on Xilinx FPGAs. Our architecture is scalable and depends only on the number and size of words. For instance, we provide results of impleme作者: minaret 時(shí)間: 2025-3-23 16:03 作者: Hyperopia 時(shí)間: 2025-3-23 20:22
Natalia Martini PhD,Sandra Rita Allnutter provably secure S-box output computation method proposed by Rivain et?al (FSE 2008). The same can be used to obtain second-order secure arithmetic to Boolean masking. We prove the security of our conversion algorithms using similar arguments as Rivain et al. Finally, we provide implementation res作者: ungainly 時(shí)間: 2025-3-24 00:40
Jon A. Skinnerer provably secure S-box output computation method proposed by Rivain et?al (FSE 2008). The same can be used to obtain second-order secure arithmetic to Boolean masking. We prove the security of our conversion algorithms using similar arguments as Rivain et al. Finally, we provide implementation res作者: Flounder 時(shí)間: 2025-3-24 03:09 作者: 郊外 時(shí)間: 2025-3-24 06:40 作者: Aromatic 時(shí)間: 2025-3-24 12:02 作者: 圓柱 時(shí)間: 2025-3-24 17:28
rom using the services on o?er. This,inanutshell,isoneofthemajorchallengesinsecurityengineering- day. How to provide servicesto individuals securelywithout making undue - cursions into their privacy at the same time. Decisions on the limits of privacy intrusions – or privacy protection, for that mat作者: 六邊形 時(shí)間: 2025-3-24 20:22 作者: 音的強(qiáng)弱 時(shí)間: 2025-3-24 23:44
Amit Sharma,Tae-Eun Kim,Salman Naziry, race and risk that invite further scholarly attention. It will be of great interest to scholars and studentsin disciplinary fields including Media and?Communication, Geography, Science and Technology Studies, Political Science and Sociology..978-1-349-71670-8978-1-137-55408-6作者: 懶鬼才會(huì)衰弱 時(shí)間: 2025-3-25 06:41 作者: packet 時(shí)間: 2025-3-25 11:04 作者: infringe 時(shí)間: 2025-3-25 12:45
Melanie L. Lancaster,Peter Winsor,Andrew Dumbrilley, race and risk that invite further scholarly attention. It will be of great interest to scholars and studentsin disciplinary fields including Media and?Communication, Geography, Science and Technology Studies, Political Science and Sociology..978-1-349-71670-8978-1-137-55408-6作者: 影響深遠(yuǎn) 時(shí)間: 2025-3-25 19:27 作者: 真 時(shí)間: 2025-3-25 22:41 作者: colostrum 時(shí)間: 2025-3-26 00:18 作者: 玩忽職守 時(shí)間: 2025-3-26 06:11 作者: DAUNT 時(shí)間: 2025-3-26 10:21
Regional Marine Spatial Planning: A Tool for Greening Blue Economy in the Bay of Bengal the BoB do not provide any explicit provisions for the development of MSP in the Bay region. The current regional conventions, agreements, declarations, organisations, programmes and plans have different provisions for management of the marine resources of the BoB. Those legal regimes have several 作者: 散開 時(shí)間: 2025-3-26 16:05
Maritime Transport and Sustainable Fisheries: Breaking the Silos; it addresses IUU fishing and the maritime sustainable aspects linked to fisheries, such as sea-based marine plastic litter, which include fishing gears (including abandoned, lost or otherwise discarded fishing gear (ALDFGs) and Drifting Fish Aggregation Devices (DFADs)). The conclusion highlights 作者: malapropism 時(shí)間: 2025-3-26 20:25 作者: AWRY 時(shí)間: 2025-3-26 23:47 作者: 尾隨 時(shí)間: 2025-3-27 04:21 作者: 凹處 時(shí)間: 2025-3-27 08:47 作者: 平項(xiàng)山 時(shí)間: 2025-3-27 11:23 作者: 脫水 時(shí)間: 2025-3-27 17:34
Canadian Ports Sustainability: A Strategic Response to Disruptive Paradigms Such as COVID-19ill significantly increase port throughputs leading to a need for improved and expanded cargo-handling infrastructure—a financial challenge. At the same time, ports are mandated to “provide a high level of safety and environmental protection”. Canadian ports are actively engaged in environmental pro作者: flamboyant 時(shí)間: 2025-3-27 18:20 作者: aphasia 時(shí)間: 2025-3-28 00:58 作者: 窒息 時(shí)間: 2025-3-28 04:18
ntracts which are essentially small computer programs that sit on top of the blockchain. They are written in programming languages like Solidity and are executed by the Ethereum Virtual Machine (EVM). Since these contracts are present on the blockchain itself, they become immutable as long as the bl作者: 凈禮 時(shí)間: 2025-3-28 06:49 作者: 松軟無力 時(shí)間: 2025-3-28 13:56 作者: lymphoma 時(shí)間: 2025-3-28 15:12
Mark J. Spalding,Angelica E. Braestrup,Alexandra Refoscoefficient hardware implementation of the Coarsely Integrated Operand Scanning method (CIOS) of Montgomery modular multiplication combined with an effective systolic architecture designed with a Two-dimensional array of Processing Elements. The systolic architecture increases the speed of calculation作者: TEM 時(shí)間: 2025-3-28 18:56
Asraful Alamced faults in security ICs for retrieving confidential internals. Since the faults are injected by disturbing circuit behaviors, FIA can possibly be detected in advance by integrating a sensitive sensor. In this paper, a full-digital detection logic against laser fault injection is proposed, which m作者: Blood-Clot 時(shí)間: 2025-3-28 23:44 作者: Etching 時(shí)間: 2025-3-29 05:52 作者: Physiatrist 時(shí)間: 2025-3-29 10:08
Natalia Martini PhD,Sandra Rita Allnuttr Boolean, arithmetic, or multiplicative. When used to protect a cryptographic algorithm that performs both Boolean and arithmetic operations, it is necessary to change the masks from one form to the other in order to be able to unmask the secret value at?the end of the algorithm. To date, known tec作者: CRUMB 時(shí)間: 2025-3-29 12:46
Jon A. Skinnerr Boolean, arithmetic, or multiplicative. When used to protect a cryptographic algorithm that performs both Boolean and arithmetic operations, it is necessary to change the masks from one form to the other in order to be able to unmask the secret value at?the end of the algorithm. To date, known tec作者: 對(duì)待 時(shí)間: 2025-3-29 19:32
Johnny Dalgaardtechnologies are spreading increasingly into our commercial and private spheres. For many people, these services have changed the way they work, communicate, shop, arrange travel, etc. Remote transactions, however, may also open possibilities for fraud and other types of misuse. Hence, the requi- me作者: happiness 時(shí)間: 2025-3-29 22:48 作者: 發(fā)酵劑 時(shí)間: 2025-3-30 02:52
Marco Fantinatomples include patient records used by medical researchers, and detailed phone call records, statistically analyzed by phone companies in order to improve their services. This problem became apparent in the 1970s and has escalated in recent years due to massive data collection and growing social awar作者: 低三下四之人 時(shí)間: 2025-3-30 04:04
technologies are spreading increasingly into our commercial and private spheres. For many people, these services have changed the way they work, communicate, shop, arrange travel, etc. Remote transactions, however, may also open possibilities for fraud and other types of misuse. Hence, the requi- me作者: 粘連 時(shí)間: 2025-3-30 08:13
Khalid R. Aldosaris on a wide range of case studies, including HIV-prevention This book explores how technologies of media, medicine, law and governance enable and constrain the mobility of bodies within geographies of space and race. Each chapter describes and critiques the ways in which contemporary technologies pr作者: 不自然 時(shí)間: 2025-3-30 14:49 作者: metropolitan 時(shí)間: 2025-3-30 18:48
Anita Rayeganis on a wide range of case studies, including HIV-prevention This book explores how technologies of media, medicine, law and governance enable and constrain the mobility of bodies within geographies of space and race. Each chapter describes and critiques the ways in which contemporary technologies pr作者: Tidious 時(shí)間: 2025-3-30 23:39
Desai Shan,Pengfei Zhangs on a wide range of case studies, including HIV-prevention This book explores how technologies of media, medicine, law and governance enable and constrain the mobility of bodies within geographies of space and race. Each chapter describes and critiques the ways in which contemporary technologies pr作者: 確定的事 時(shí)間: 2025-3-31 01:49
Melanie L. Lancaster,Peter Winsor,Andrew Dumbrilles on a wide range of case studies, including HIV-prevention This book explores how technologies of media, medicine, law and governance enable and constrain the mobility of bodies within geographies of space and race. Each chapter describes and critiques the ways in which contemporary technologies pr作者: Flatus 時(shí)間: 2025-3-31 09:00 作者: 關(guān)心 時(shí)間: 2025-3-31 13:08
Green Ports and Sustainable Shipping in the European Contextegions, we present the green port and shipping practices and relevant regulations for environmentally sustainable shipping. Furthermore, we propose a high-level conceptual framework for the implementation of the green port and shipping practices. Finally, we discuss some future research directions.作者: 陳列 時(shí)間: 2025-3-31 13:32