搜索结果: 1-11 共查到“军事学 Review”相关记录11条 . 查询时间(0.375 秒)
Towards a Hybrid Public Key Infrastructure (PKI): A Review
Certificate-based PKI Identity-based public key cryptography (ID-PKC) Hybrid PKI
2019/7/15
Traditional Certificate-based public key infrastructure (PKI) suffers from the problem of certificate overhead like its storage, verification, revocation etc. To overcome these problems, the idea of c...
Building Militaries in Fragile States: Challenges for the United States (Book Review)
Building Militaries the United States Iraq BWT
2019/10/11
After more than a decade of supporting large expeditionary forces in Iraq and Afghanistan, the U.S. battle cry today is “by, with, and through” (BWT). According to General Joseph Votel, Commander U.S....
Peace Works: America's Unifying Role in a Turbulent World (Book Review)
Peace Works America's Unifying Role Turbulent World
2019/10/11
Peace Works is two things: an impassioned argument on why the United States should involve itself in conflict prevention, management and peace-making; and an important contribution to the practitioner...
With an historian’s keen eye for detail and nuance, John Lewis Gaddis surveys a variety of case studies from the Peloponnesian War to World War II in his new book On Grand Strategy, identifying in the...
The Politics of Weapons Inspections: Assessing WMD Monitoring and Verification Regimes (Book Review)
Weapons Inspections Verification Regimes WMD
2019/10/21
Nathan E. Busch and Joseph F. Pilat in their book The Politics of Weapons Inspections: Assessing WMD Monitoring and Verification Regimes draw attention to the important role that politics ca...
The Darkest Sides of Politics, II: State Terrorism, "Weapons of Mass Destruction," Religious Extremism, and Organized Crime (Book Review)
State Terrorism Religious Extremism Organized Crime Weapons of Mass Destruction
2019/10/21
In this companion to his first volume on Postwar Facism, Covert Operations, and Terrorism, Jeffrey Bale explores the influence of some of the world’s most pressing security concerns through a rev...
Dirty War: Rhodesia and Chemical Biological Warfare 1975-1980 (Book Review)
Chemical Biological Warfare biological warfare chemical
2019/10/21
Glenn Cross’s Dirty War: Rhodesia and Chemical Biological Warfare 1975–1980 is a welcome addition to the small, but growing scholarly literature on the history of chemical and biological war...
A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes
AES BFs
2018/5/11
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of utmost importance...
A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes
public-key cryptography BFs
2017/12/1
4-bit Linear Relations play an important role in Cryptanalysis of 4-bit Bijective Crypto S-boxes. 4-bit finite differences also a major part of cryptanalysis of 4-bit substitution boxes. Count of exis...
American Standards Committee X9, Financial Services, Inc., Subcommittee F, Working Group 1 (X9F1) requests a cryptographic review of the four key wrap algorithms in the draft key wrap standard, ANS X9...
Review of David S. Sorenson, Shutting Down the Cold War: The Politics of Military Base Closure
David S. Sorenson Cold War Politics of Military Base Closure
2009/3/12
The end of the Cold War has precipitated dramatic cuts to defence budgets in the United States, leaving politicians and military officials scrambling to reassess the balancing of scarce resources and ...