Seventh Framework Programme Strategic Objective Information Security in Supply Chain Management Secure Supply Chain Management Acronym Securescm Wp9 Cryptographic Aspects D9.2 Security Analysis Strep-project Wptitle Deliverable Securescm Cryptographic Aspects D9.2 Security Analysis Versioning and Contribution History
ثبت نشده
چکیده
منابع مشابه
Secure Linear Programming Using Privacy-Preserving Simplex
The SecureSCM project (www.securescm.org) aims to develop cryptographic solutions to the problem of data sharing in Supply Chain Optimization (SCO). The SCO problem has a precise mathematical structure. It is an instance of the general Linear Programming (LP) problem. However, standard techniques for LP problems are not suitable for this purpose because they require participants to reveal priva...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملSecure collaboration in design and supply chain management
Increasing global competition has led to massive outsourcing of manufacturing businesses. Such outsourcing practices require effective collaborations between the manufacturing companies and their partners by sharing a large amount of information. In the meantime, since some of the partners are also potential competitors, protection of confidential information, particularly intellectual property...
متن کاملPROVIDING A MODEL FOR THE SUPPLIER SELECTION PROCESS IN THE SUPPLY CHAIN MANAGEMENT WITH HYBRID MODEL OF DECISION MAKING
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009