نتایج جستجو برای: countermeasure

تعداد نتایج: 4411  

Journal: :International Journal of Network Security & Its Applications 2011

Journal: :The Lancet Respiratory Medicine 2014

Journal: :J. Internet Serv. Inf. Secur. 2013
Shigeyoshi Shima Ayako Komatsu

Information security incidents involving internal improprieties that threaten the very business of Japanese organizations have drawn attention. Internal improprieties are one of problems to be solved in Japanese organizations. However, it is difficult to share information about internal impropriety incidents and to consider the causes of and effective countermeasures for internal improprieties ...

2009
Linda Ariani Gunawan Peter Herrmann Frank Alexander Kraemer

Security is an important feature of system design which should be taken into account early in the development of systems. We propose an extension of the SPACE engineering method in order to integrate security aspects into the system design and implementation. The integration of security mechanisms is facilitated by collaboration-oriented models of the functional system specification (i.e., by d...

2013
Sachin D. Babar Neeli R. Prasad Ramjee Prasad

In last few decades, there has been a wide demand of wireless sensor networks (WSNs) in extensive mission critical applications such as monitoring, industrial control, military, health and many more. The larger demand of WSN in mission critical applications makes it more prone towards malicious users who are trying to invade. These security assaults worsen the performance of WSN in large extent...

Journal: :journal of water sciences research 2011
t esmaeili a.a dehghani m.r pirestani tetsuya sumi

local scouring around bridge piers is a natural phenomenon caused by the erosive process of flowing stream on alluvial beds. the 3d flow field around bridge piers interacting with the bed materials increases complexity of local scour process. the local scour depth develops in accelerated flows and if it is not predicted correctly, the bottom level of local scour hole will exceed the original le...

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

2003
Mehdi-Laurent Akkar Louis Goubin

Di erential Power Analysis (DPA) on smart-cards was introduced by Paul Kocher [11] in 1998. Since, many countermeasures have been introduced to protect cryptographic algorithms from DPA attacks. Unfortunately these features are known not to be e cient against high order DPA (even of second order). In these paper we will rst describe new specialized rst order attack and remind how are working hi...

1996
Ceki Gülcü Gene Tsudik

Increasingly large numbers of people communicate today via electronic means such as email or news forums. One of the basic properties of the current electronic communication means is the identiication of the end-points. However, at times it is desirable or even critical to hide the identity and/or whereabouts of the end-points (e.g., human users) involved. This paper discusses the goals and des...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید