搜索结果: 1-15 共查到“Protected”相关记录102条 . 查询时间(0.062 秒)
Remote Sensing Applications in Monitoring of Protected Areas
protected areas (PAs) biodiversity conservation spatiotemporal dynamics climate change human disturbances management and governance
2024/1/11
Protected areas (PAs) have been established worldwide for achieving long-term goals in the conservation of nature with the associated ecosystem services and cultural values. Globally, 15% of the world...
Biodiversity Conservation of National Parks and Nature-Protected Areas in West Africa: The Case of Kainji National Park, Nigeria
carbon storage and sequestration climate change habitat diversity Kainji National Park protected areas air quality
2023/11/20
Due to rising global warming and climate change, biodiversity protection has become a critical ecological concern. Rich biodiversity zones are under threat and are deteriorating, necessitating nationa...
Overfishing and other human pressures are severely harming many marine protected areas around the world, study finds
ecological destruction edge effect marine conservation areas MPA
2021/8/11
A new study points to a strong 'edge effect' in marine protected areas (MPAs), sharply reducing by 60 percent the fish population living up to 1 - 1.5 km within the MPA. This significantly diminishes ...
SPQCop: Side-channel protected Post-Quantum Cryptoprocessor
cryptography post-quantum key-exchange cryptoprocessor
2019/7/8
The past few decades have seen significant progress in practically realizable quantum technologies. It is well known since the work of Peter Shor that large scale quantum computers will threaten the s...
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Leakage-resilience authenticated encryption leveled implementation
2019/5/9
This paper presents CONCRETE (Commit-Encrypt-Send-the-Key) a new Authenticated Encryption mode that offers CIML2 security, that is, ciphertext integrity in the presence of nonce misuse and side-channe...
High-speed Side-channel-protected Encryption and Authentication in Hardware
AES Galois/Counter Mode (GCM) FPGA
2018/11/12
This paper describes two FPGA implementations for the encryption and authentication of data, based on the AES algorithm running in Galois/Counter mode (AES-GCM). Both architectures are protected again...
Practical Attacks on Relational Databases Protected via Searchable Encryption
searchable symmetric encryption relational databases inference attacks
2018/8/2
Searchable symmetric encryption (SSE) schemes are commonly proposed to enable search in a protected unstructured documents such as email archives or any set of sensitive text files. However, some SSE ...
The Tao of Inference in Privacy-Protected Databases
inference attacks encrypted databases privacy
2017/11/13
To protect database confidentiality even in the face of full compromise while supporting standard functionality, recent academic proposals and commercial products rely on a mix of encryption schemes. ...
The efficient protection of security critical devices against side-channel analysis attacks is a fundamental need in the age of Internet of Things and ubiquitous computing. In this work, we introduce ...
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF
T-PAKE PPSS
2017/4/27
We present TOPPSS, the most efficient Password-Protected Secret Sharing (PPSS) scheme to date. A (t; n)-threshold PPSS, introduced by Bagherzandi et al, allows a user to share a secret among n servers...
Livestock can uproot protected wildlife from prime real estate
Livestock uproot protected wildlife prime real estate
2017/3/30
The story of wildlife conservation is usually framed as man vs. treasured wildlife. But there’s growing evidence that the narrative deserves to have leading roles for livestock such as sheep, yaks or ...
Large marine protected areas effectively protect reef shark populations,Stanford scientists find
Large marine protected areas reef shark populations Stanford scientists
2017/2/16
Originating 423 million years ago, sharks are a group of predators that span 490 species and still play crucial roles within their ecosystems. We often characterize these top predators as nearly indes...
Stanford researchers find that the future of Antarctic marine protected areas is at risk
Stanford researchers Antarctic marine protected areas at risk
2016/11/4
Antarctica’s surrounding waters are home to some of the healthiest marine ecosystems on Earth and support thriving populations of krill, seabirds, fish and whales. But efforts to establish a network o...
New York Harbor’s Oyster Beds Once Protected Against Severe Storms and Extreme Wave Damage
New York Harbor Oyster Beds Protected Against Severe Storms Extreme Wave Damage
2016/3/14
A recent study of past disturbance of the oyster beds in New York Harbor led by geoscientist Jonathan Woodruff and his doctoral student Christine Brandon of the University of Massachusetts Amherst is ...
Robust Password-Protected Secret Sharing
Password-Protected Secret Sharing Robust Threshold Secret Sharing Scheme with respect to Random Failures Oblivious Pseudorandom Functions
2016/2/23
Password-protected secret sharing (PPSS) schemes allow a user to publicly share this highentropy
secret across different servers and to later recover it by interacting with some of these servers
usi...