Narrow your search
Listing 1 - 6 of 6
Sort by

Book
Draft environmental impact statement for Florida Keys National Marine Sanctuary : a restoration blueprint.
Authors: ---
Year: 2019 Publisher: [Key West, Fla.] : Office of National Marine Sanctuaries, National Oceanic and Atmospheric Administration, Florida Keys National Marine Sanctuary,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
Florida Keys National Marine Sanctuary restoration blueprint
Author:
Year: 2019 Publisher: [Key West, Fla.] : Florida Keys National Marine Sanctuary,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Draft environmental impact statement for Florida Keys National Marine Sanctuary : a restoration blueprint.
Authors: ---
Year: 2019 Publisher: [Key West, Fla.] : Office of National Marine Sanctuaries, National Oceanic and Atmospheric Administration, Florida Keys National Marine Sanctuary,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Florida Keys National Marine Sanctuary restoration blueprint
Author:
Year: 2019 Publisher: [Key West, Fla.] : Florida Keys National Marine Sanctuary,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Stories of tonality in the age of François-Joseph Fétis
Author:
ISBN: 9780226626925 022662692X 9780226627083 022662708X Year: 2019 Publisher: Chicago : The University of Chicago Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

'Stories of Tonality in the Age of Franco̧is-Joseph Fétis' explores the concept of musical tonality through the writings of the Belgian musicologist Franco̧is-Joseph Fétis (1784-1867), who was singularly responsible for theorizing and popularizing the term in the nineteenth century. The text weaves a rich story in which tonality emerges as a theoretical construct born of anxiety and alterity for Europeans during this time as they learned more about 'other' musics and alternative tonal systems.


Book
Side Channel Attacks
Author:
ISBN: 3039210017 3039210009 Year: 2019 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.

Keywords

n/a --- binary Huff curve --- FPGA --- post quantum cryptography --- data loss --- side-channel cache attacks --- rsa cryptosystem --- first-order analysis --- chaotic circuit --- integrity --- ad libraries --- power-analysis attack --- single trace analysis --- side-channel authentication --- provable security --- ad lib --- cache misses --- cache side-channel attack --- leakage model --- NTRU --- graph --- AES --- hardware security --- recovery of secret exponent by triangular trace analysis --- side-channel attacks --- information leakage --- data outsourcing --- CPLD --- scatter-gather implementation --- modular exponentiation --- lattice-based cryptography --- elliptic curve cryptography --- Gaussian sampling --- post-quantum cryptography --- reliability --- unified point addition --- ad networks --- graph similarity --- mobile ads --- physically unclonable function --- tweakable block cipher --- Merkle (hash) tree --- machine-learning classification --- side channel attack --- online authentication --- side channel analysis --- financial IC card --- side-channel attack --- re-keying --- cloud computing --- cryptographic keys --- chaos theory --- horizontal collision correlation analysis --- countermeasure --- embedded system security --- cache attack --- single-trace attack --- software development kit (SDK) --- CDT sampling --- key bit-dependent attack --- side-channel analysis --- second-order analysis --- constant-time cryptographic algorithm --- android package (APK) --- challenge-response authentication

Listing 1 - 6 of 6
Sort by