نتایج جستجو برای: security order

تعداد نتایج: 1066303  

2017
Anthony Journault François-Xavier Standaert

In this paper, we study the performances and security of recent masking algorithms specialized to parallel implementations in a 32-bit embedded software platform, for the standard AES Rijndael and the bitslice cipher Fantomas. By exploiting the excellent features of these algorithms for bitslice implementations, we first extend the recent speed records of Goudarzi and Rivain (presented at Euroc...

2013
Lalitha Kumari

In order to fulfill the organization goals and objectives, multilayered network architecture and various heterogeneous server environments are used. As the network architectures are complex, there is an increased demand in information security. So each organization needs to provide sufficient network security for the known and the unknown attacks according to its goals, requirements and objecti...

Esmaeil Salehi, Mehrdad Mazloumi Mozhgan Nozari,

Since, in the same vein as public spaces, urban green spaces play a significant role in establishing social interactions in the Iranian cities, security concerns need to be taken more seriously in such places than other social environments, the insufficiency of which could diminish their functional capacity. This could in turn lead to a source of subsequent difficulties in urban spaces. Therefo...

Journal: :PeerJ Computer Science 2015
Nicandro Scarabeo Benjamin C. M. Fung Rashid Hussain Khokhar

Managed Security Services (MSS) have become an essential asset for companies to have in order to protect their infrastructure from hacking attempts such as unauthorized behaviour, denial of service (DoS), malware propagation, and anomalies. A proliferation of attacks has determined the need for installing more network probes and collecting more security-related events in order to assure the bes...

2011
Takahiro Matsuda Kanta Matsuura

Whether it is possible to construct a chosen ciphertext secure (CCA secure) public key encryption (PKE) scheme only from a chosen plaintext secure (CPA secure) one is a fundamental open problem, and the best known positive results regarding this problem are the constructions of so-called bounded CCA secure schemes. Since we can achieve the best possible security in the bounded CCA security noti...

2014
Kerry Back Kevin Crotty Tao Li

We derive a structural model of the amount of private information that is conveyed to the market via order flows. The model is a continuous-time Kyle model in which there is public information arrival and in which the strategic trader may or may not have private information. For empirical implementation, we treat each trading day as a separate instance of the model. Monte Carlo analysis shows t...

2009
Jukka Vuorinen Pekka Tetri

Our intention is to use Deleuze and Guattari’s concepts of machine and territory to place the classical notion of information security in a new light. In other words, we seek to describe how information security appears if confidentiality, integrity, and availability (CIA) and identification, authentication, and authorization (IAA) are considered to constitute part of a dynamic security machine...

2012
Dominik Balthasar

The self-declared Republic of Somaliland frequently features as a prominent example for ‘autonomous’ processes of peace-building and state-making. Although its population endured civil wars both before and after its unilateral declaration of independence in 1991, this internationally unrecognized de facto state enjoys not only relative peace but also a comparatively high level of overall securi...

2011
Alexandra Boldyreva Nathan Chenette Adam O'Neill

We further the study of order-preserving symmetric encryption (OPE), a primitive for allowing efficient range queries on encrypted data, recently initiated (from a cryptographic perspective) by Boldyreva et al. (Eurocrypt ’09). First, we address the open problem of characterizing what encryption via a random order-preserving function (ROPF) leaks about underlying data (ROPF being the “ideal obj...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید