Threat to security

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Opportunity or Threat to Security ?

Between February 20 and 27, 2003, under the code name ‘Schriever II’, friendly ‘blue’ forces faced ‘red’ enemy forces during 8 days of a fierce battle in outer space. More than 300 military and civilian experts from more than 30 US agencies participated in this space war that took place 14 years in the future. Schriever II was only a war game, set in the year 2017! It took place at Schriever Ai...

متن کامل

Reaction to New Security Threat Class

Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified threat classes as it is reflected in the number of patents, scientific articles and professional publications over a long period of time. The fol...

متن کامل

Rfid Security Threat Model

Radio Frequency Identification (RFID) technology promises benefits that accrue from being able to identify and track individual goods in commercial supply chains. This helps in inventory management, reduces theft, can be used in conjunction with other sensor technology to identify damaged goods, and promises cost reductions. The objective of this paper is to identify potential threats to commer...

متن کامل

Wirless Security Threat Taxonomy

Several papers have published very specific threats to wireless networks—specifically in the area of attacks against the IEEE 802.11 Wired Equivalency Protocol (WEP). Other papers have addressed wireless attacks based on the attack models used in wired networks. However, the different characteristics of wireless networks require looking at the threat differently. We present a Wireless Threat Ta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Index on Censorship

سال: 1981

ISSN: 0306-4220,1746-6067

DOI: 10.1080/03064228108533268