Suchergebnisse - "Computer engineering. Computer hardware"

  1. 1

    Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude von Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani

    ISSN: 1751-8709, 1751-8717
    Veröffentlicht: Institution of Engineering and Technology (IET) 30.10.2023
    Veröffentlicht in IET Information Security (30.10.2023)
    Volltext
    Journal Article
  2. 2

    Analyzing The Characterization of Municipal Solid Waste in Da Nang City, Vietnam von Giang Minh Hoang, Cuong Dinh Le, Takeshi Fujiwara, Song Toan Pham Phu, Naoya Akasaki, Dinh Van Pham

    ISSN: 2283-9216, 2283-9216
    Veröffentlicht: AIDIC Servizi S.r.l 01.02.2021
    Veröffentlicht in Chemical Engineering Transactions (01.02.2021)
    “… Recently, most cities in Vietnam are facing waste problems that are mainly caused by the rapid increase of municipal solid waste (MSW) amount and the …”
    Volltext
    Journal Article
  3. 3

    An Artificial Olfactory System for Toxic Compounds Classification using Machine Learning Techniques von Cruz, Carlos, Aleixandre, Manuel, Matatagui, Daniel, Horrillo, M.C.

    ISSN: 2283-9216, 2283-9216
    Veröffentlicht: Italian Association of Chemical Engineering 01.10.2022
    Veröffentlicht in Chemical Engineering Transactions (01.10.2022)
    “… The long-term exposure to nitrogen dioxide produces harmful effects for humans and any living being. Thus, in security applications, sensor arrays are required …”
    Volltext
    Journal Article
  4. 4

    Revisiting Yoyo Tricks on AES von Mondal, Sandip Kumar, Rahman, Mostafizar, Sarkar, Santanu, Adhikari, Avishek

    ISSN: 2519-173X
    Veröffentlicht: Universitatsbibliothek der Ruhr-Universitat Bochum 08.12.2023
    Veröffentlicht in IACR Transactions on Symmetric Cryptology (08.12.2023)
    Volltext
    Journal Article
  5. 5

    Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs von Ueno, Rei, Xagawa, Keita, Tanaka, Yutaro, Ito, Akira, Takahashi, Junko, Homma, Naofumi

    ISSN: 2569-2925, 2569-2925
    Veröffentlicht: Ruhr-Universität Bochum 19.11.2021
    “… This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the Fujisaki–Okamoto (FO) transformation and its variants. The …”
    Volltext
    Journal Article
  6. 6
  7. 7

    Cryptanalysis of Plantlet von Banik, Subhadeep, Barooti, Khashayar, Isobe, Takanori

    ISSN: 2519-173X
    Veröffentlicht: Universitatsbibliothek der Ruhr-Universitat Bochum 20.09.2019
    Veröffentlicht in IACR Transactions on Symmetric Cryptology (20.09.2019)
    Volltext
    Journal Article
  8. 8
  9. 9

    Anthropogenic Mercury Release Flow in China von Habuer, Takeshi Fujiwara, Masaki Takaoka

    ISSN: 2283-9216
    Veröffentlicht: AIDIC Servizi S.r.l 01.02.2021
    Veröffentlicht in Chemical engineering transactions (01.02.2021)
    “… China is the largest emitter of anthropogenic mercury worldwide. Implementation of the Minamata Convention on Mercury will significantly impact the …”
    Volltext
    Journal Article
  10. 10

    Solid Waste Collection System in Tourism Destination-The Status, Problems and Challenges von Takeshi Fujiwara, Cuong Le Dinh, Song Toan Pham Phu, Misuzu Asari

    ISSN: 2283-9216, 2283-9216
    Veröffentlicht: AIDIC Servizi S.r.l 01.02.2021
    Veröffentlicht in Chemical Engineering Transactions (01.02.2021)
    “… Solid waste collection system (SWCS) plays an extremely important role in solid waste management system (SWMS). Optimization on SWCS have always been a primary …”
    Volltext
    Journal Article
  11. 11

    Enhancing Waste Management Practice - The Appropriate Strategy for Improving Solid Waste Management System in Vietnam Towards Sustainability von Song Toan Pham Phu, Yen Anh Tran Thi, Giang Minh Hoang, Cuong Dinh Le, Takeshi Fujiwara, Dinh Van Pham, Hoa Kieu Thi

    ISSN: 2283-9216, 2283-9216
    Veröffentlicht: AIDIC Servizi S.r.l 01.02.2020
    Veröffentlicht in Chemical Engineering Transactions (01.02.2020)
    “… This study aims to build the appropriate model of waste management practice (WMP) towards sustainable municipal solid waste (MSW) system in a city of …”
    Volltext
    Journal Article
  12. 12

    Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme von Ueno, Rei, Homma, Naofumi, Inoue, Akiko, Minematsu, Kazuhiko

    ISSN: 2569-2925, 2569-2925
    Veröffentlicht: Ruhr-Universität Bochum 04.12.2023
    “… This paper presents a provably secure, higher-order, and leakage-resilient (LR) rekeying scheme named LR Rekeying with Random oracle Repetition (LR4), along …”
    Volltext
    Journal Article
  13. 13

    Self‐Powered and Interface‐Independent Tactile Sensors Based on Bilayer Single‐Electrode Triboelectric Nanogenerators for Robotic Electronic Skin von Lin, Yucheng, Duan, Shengshun, Zhu, Di, Li, Yinghui, Wang, Binghao, Wu, Jun

    ISSN: 2640-4567, 2640-4567
    Veröffentlicht: Weinheim John Wiley & Sons, Inc 01.04.2023
    Veröffentlicht in Advanced intelligent systems (01.04.2023)
    “… Self‐powered flexible tactile sensors based on triboelectric nanogenerators (TENGs) can be of use in the development of robotic intellisense and interaction …”
    Volltext
    Journal Article
  14. 14

    Slow Release Fertiliser Production from Poultry Manure von Purnomo, C.W., Indarti, S., Wulandari, C., Hinode, H., Kiyohiko Nakasaki

    ISSN: 2283-9216, 2283-9216
    Veröffentlicht: AIDIC Servizi S.r.l 01.03.2017
    Veröffentlicht in Chemical Engineering Transactions (01.03.2017)
    “… Fertilisers are essential nutrient supplements, which can enhance the productivity and growth rate of plants. Application of slow release fertiliser (SRF) on …”
    Volltext
    Journal Article
  15. 15

    Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G von Sakamoto, Kosei, Liu, Fukang, Nakano, Yuto, Kiyomoto, Shinsaku, Isobe, Takanori

    ISSN: 2519-173X, 2519-173X
    Veröffentlicht: Ruhr-Universität Bochum 11.06.2021
    Veröffentlicht in IACR Transactions on Symmetric Cryptology (11.06.2021)
    “… In this paper, we present an AES-based authenticated-encryption with associated-data scheme called Rocca, with the purpose to reach the requirements on the …”
    Volltext
    Journal Article
  16. 16

    Determining Crispness Level of Dry Food through Its Compressive Strain Energy von Triawan, Farid, Aprilia, Gloria, Saptaji, Kushendarsyah, Saville, Ramadhona, Nandiyanto, Asep

    ISSN: 2656-1972, 2656-8179
    Veröffentlicht: Faculty of Engineering and Technology, Sampoerna University 26.09.2021
    “… Crispness is the most appealing characteristic of dry food products. However, the term crispness has different subjective meaning among consumers. This study …”
    Volltext
    Journal Article
  17. 17

    Analyzing Fast-ions Trajectories in a Nuclear Fusion Reactor through Its Poincaré-Island Size and Ripple Resonance von Kurniawan, Anggi, Tsutsui, Hiroaki

    ISSN: 2656-1972, 2656-8179
    Veröffentlicht: Sampoerna University - Faculty of Engineering and Technology 25.09.2021
    “… Fast-ions confinement is a prominent subject in developing nuclear fusion reactors due to its importance in sustaining the burning plasma and keeping energy …”
    Volltext
    Journal Article
  18. 18
  19. 19

    A System Analysis of Cold Storage using the New Non-Freon Refrigerant GF-08 von Shun Kataniwa, Kiyoshi Dowaki

    ISSN: 2283-9216, 2283-9216
    Veröffentlicht: AIDIC Servizi S.r.l 01.02.2020
    Veröffentlicht in Chemical Engineering Transactions (01.02.2020)
    “… The equipment for chilling or freezing food consumes much energy. Therefore, there is a need to reduce the energy consumption. Also, to contribute to reduce …”
    Volltext
    Journal Article
  20. 20

    Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure von Nashimoto, Shoei, Suzuki, Daisuke, Ueno, Rei, Homma, Naofumi

    ISSN: 2569-2925, 2569-2925
    Veröffentlicht: Ruhr-Universität Bochum 19.11.2021
    “… RISC-V is equipped with physical memory protection (PMP) to prevent malicious software from accessing protected memory regions. PMP provides a trusted …”
    Volltext
    Journal Article