Countermeasure against Social Technologic Attack using Privacy Input-Detection

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Privacy against Composition Attack

Data anonymization has become a major technique in privacy preserving data publishing. Many methods have been proposed to anonymize one dataset and a series of datasets of a data holder. However, no method has been proposed for the anonymization scenario of multiple independent data publishing. A data holder publishes a dataset, which contains overlapping population with other datasets publishe...

متن کامل

Formal Study of a Countermeasure Against Side-Channel Attack

Context. In applications such as cryptography or real-time systems, formal methods are used to prove functional properties on the critical parts of the code. Specifically in cryptography, some nonfunctional properties are also important, but are not typically certified by formal proofs yet. One example of such a property is the resistance to side-channel attacks. Side-channel attacks are a real...

متن کامل

Countermeasure Against Physical Layer Attack in Cognitive Radio Networks

A “Cognitive radio” is a latest technology aiming to solve the spectrum scarcity problem by allocating the spectrum to secondary users. It aims to improve the utilization of the radio spectrum by reducing the spectrum holes. The existing systems that have been proposed so far provided the solution for some attacks in the Physical layer of Cognitive radio with a limited number of nodes, evaluate...

متن کامل

Countermeasure against tailored bright illumination attack for DPS-QKD.

We propose a countermeasure against the so-called tailored bright illumination attack for differential-phase-shift QKD (DPS-QKD). By monitoring a rate of coincidence detection at a pair of superconducting nanowire single-photon detectors (SSPDs) which is connected at each of the output ports of Bob's Mach-Zehnder interferometer, Alice and Bob can detect and defeat this kind of attack. We also e...

متن کامل

Countermeasure against Side-Channel Attack in Shared Memory of TrustZone

In this paper we introduced countermeasures against side-channel attacks in the shared memory of TrustZone. We proposed zero-contention cache memory or policy between REE and TEE to prevent from TruSpy attacks in TrustZone. And we suggested that delay time of data path of REE is equal or similar to that of data path of TEE to prevent timing side-channel attacks. Also, we proposed security infor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of the Korea Contents Association

سال: 2012

ISSN: 1598-4877

DOI: 10.5392/jkca.2012.12.05.032