نتایج جستجو برای: countermeasure
تعداد نتایج: 4411 فیلتر نتایج به سال:
Information security incidents involving internal improprieties that threaten the very business of Japanese organizations have drawn attention. Internal improprieties are one of problems to be solved in Japanese organizations. However, it is difficult to share information about internal impropriety incidents and to consider the causes of and effective countermeasures for internal improprieties ...
Security is an important feature of system design which should be taken into account early in the development of systems. We propose an extension of the SPACE engineering method in order to integrate security aspects into the system design and implementation. The integration of security mechanisms is facilitated by collaboration-oriented models of the functional system specification (i.e., by d...
In last few decades, there has been a wide demand of wireless sensor networks (WSNs) in extensive mission critical applications such as monitoring, industrial control, military, health and many more. The larger demand of WSN in mission critical applications makes it more prone towards malicious users who are trying to invade. These security assaults worsen the performance of WSN in large extent...
local scouring around bridge piers is a natural phenomenon caused by the erosive process of flowing stream on alluvial beds. the 3d flow field around bridge piers interacting with the bed materials increases complexity of local scour process. the local scour depth develops in accelerated flows and if it is not predicted correctly, the bottom level of local scour hole will exceed the original le...
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
Di erential Power Analysis (DPA) on smart-cards was introduced by Paul Kocher [11] in 1998. Since, many countermeasures have been introduced to protect cryptographic algorithms from DPA attacks. Unfortunately these features are known not to be e cient against high order DPA (even of second order). In these paper we will rst describe new specialized rst order attack and remind how are working hi...
Increasingly large numbers of people communicate today via electronic means such as email or news forums. One of the basic properties of the current electronic communication means is the identiication of the end-points. However, at times it is desirable or even critical to hide the identity and/or whereabouts of the end-points (e.g., human users) involved. This paper discusses the goals and des...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید