Threat to security
نویسندگان
چکیده
منابع مشابه
Differential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملOpportunity or Threat to Security ?
Between February 20 and 27, 2003, under the code name ‘Schriever II’, friendly ‘blue’ forces faced ‘red’ enemy forces during 8 days of a fierce battle in outer space. More than 300 military and civilian experts from more than 30 US agencies participated in this space war that took place 14 years in the future. Schriever II was only a war game, set in the year 2017! It took place at Schriever Ai...
متن کاملReaction to New Security Threat Class
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified threat classes as it is reflected in the number of patents, scientific articles and professional publications over a long period of time. The fol...
متن کاملRfid Security Threat Model
Radio Frequency Identification (RFID) technology promises benefits that accrue from being able to identify and track individual goods in commercial supply chains. This helps in inventory management, reduces theft, can be used in conjunction with other sensor technology to identify damaged goods, and promises cost reductions. The objective of this paper is to identify potential threats to commer...
متن کاملWirless Security Threat Taxonomy
Several papers have published very specific threats to wireless networks—specifically in the area of attacks against the IEEE 802.11 Wired Equivalency Protocol (WEP). Other papers have addressed wireless attacks based on the attack models used in wired networks. However, the different characteristics of wireless networks require looking at the threat differently. We present a Wireless Threat Ta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Index on Censorship
سال: 1981
ISSN: 0306-4220,1746-6067
DOI: 10.1080/03064228108533268