搜索结果: 1-15 共查到“TLS”相关记录111条 . 查询时间(0.086 秒)
Applications of TLS and ALS in Evaluating Forest Ecosystem Services: A Southern Carpathians Case Study
ecosystem services natural capital socio-economic system ecological indicators terrestrial laser scanning aerial laser scanning
font style='font-size:12px;'>
2023/12/15
Forests play an important role in biodiversity conservation, being one of the main providers of ecosystem services, according to the Economics of Ecosystems and Biodiversity. The functions and ecosyst...
Using TLS-Measured Tree Attributes to Estimate above Ground Biomass in Small Black Spruce Trees
terrestrial laser scanning biomass black spruce allometric equations
font style='font-size:12px;'>
2023/12/8
Research Highlights: This study advances the effort to accurately estimate the biomass of trees in peatlands, which cover 13% of Canada’s land surface. Background and Objectives: Trees remove carbon f...
中国科学院声学研究所专利:一种TLS通道加密的RDP协议明文数据采集系统及方法
中国科学院声学研究所 专利 TLS通道加密 RDP协议 明文数据采集
font style='font-size:12px;'>
2023/3/28
中国科学院声学研究所专利:一种网络保密数据采集系统SSL/TLS会话重用的支持方法
中国科学院声学研究所 专利 网络保密 数据采集系统 SSL/TLS会话重用 支持方法
font style='font-size:12px;'>
2023/3/28
中国科学院声学研究所专利:一种基于镜像流的SSL/TLS协议明文数据采集方法
中国科学院声学研究所 专利 镜像流 SSL/TLS协议 明文数据采集
font style='font-size:12px;'>
2023/3/28
基于TLS的靶板穿孔特征识别提取方法
靶板穿孔 点云处理 三维激光扫描 特征识别提取
font style='font-size:12px;'>
2021/2/26
为了能够更好地研究战斗部的破片毁伤效应,对靶板的毁伤效果进行更加快速、准确地评估,采用三维激光扫描技术进行快速靶板毁伤效果评估。利用相位式三维激光扫描仪获得爆破前后的战斗部及靶板点云数据,通过原始阵列式点云的内部点间关系及变化情况,识别爆破后的靶板穿孔特征,同时统计穿孔特征并计算飞散角等信息。数据验证结果表明,该方法能够有效输出爆破特征的位置、形状及抛射方向,并通过统计值及分布计算为靶板毁伤效果评...
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH
post-quantum cryptography TLS SSH
font style='font-size:12px;'>
2019/7/25
Once algorithms for quantum-resistant key exchange and digital signature schemes are selected by standards bodies, adoption of post-quantum cryptography will depend on progress in integrating those al...
The privacy of the TLS 1.3 protocol
privacy TLS 1.3 AKE protocols
font style='font-size:12px;'>
2019/6/26
TLS (Transport Layer Security) is a widely deployed protocol that plays a vital role in securing Internet trafic. Given the numerous known attacks for TLS 1.2, it was imperative to change and even red...
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
applied cryptography provable security TLS
font style='font-size:12px;'>
2019/4/29
Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of interactions...
Continuing to reflect on TLS 1.3 with external PSK
TLS 1.3 pre-shared key post-handshake authentication
font style='font-size:12px;'>
2019/4/28
The TLS protocol is the main cryptographic protocol of the Internet. The work on its current version, TLS 1.3, was completed in 2018. This version differs from the previous ones and has been developed...
Selfie: reflections on TLS 1.3 with PSK
Reflection attack Network security Multi-Stage Key Exchange model
font style='font-size:12px;'>
2019/4/3
TLS 1.3 allows two parties to establish a shared session key from an out-of-band agreed Pre Shared Key (PSK) is used to mutually authenticate the parties, under the assumption that it is not shared wi...
A COMPARISON BETWEEN TLS AND UAV TECHNOLOGIES FOR HISTORICAL INVESTIGATION
3D Survey photogrammetry solomonic order 3D modelling cultural heritage Andrea Pozzo St Ignazio altar
font style='font-size:12px;'>
2019/3/4
The architectural and sculptural value of the investigated Cultural Heritage has suggested a variety of possible approaches ranging from the traditional modus operandi to the implementation of innovat...
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
session resumption forward secrecy 0-RTT
font style='font-size:12px;'>
2019/3/4
The TLS 1.3 0-RTT mode enables a client reconnecting to a server to send encrypted application-layer data in "0-RTT" ("zero round-trip time"), without the need for a prior interactive handshake. This ...
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
TLS Bleichenbacher Side-channels
font style='font-size:12px;'>
2018/12/3
Over the last twenty years researchers and implementors had spent a huge amount of effort in developing and deploying numerous mitigation techniques which were supposed to plug all the possible source...
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure
Lucky 13 attack TLS Side-channel cache attacks
font style='font-size:12px;'>
2018/8/20
Today, about 10% of TLS connections are still using CBC-mode cipher suites, despite a long history of attacks and the availability of better options (e.g. AES-GCM). In this work, we present three new ...