نتایج جستجو برای: security order
تعداد نتایج: 1066303 فیلتر نتایج به سال:
In this paper, we study the performances and security of recent masking algorithms specialized to parallel implementations in a 32-bit embedded software platform, for the standard AES Rijndael and the bitslice cipher Fantomas. By exploiting the excellent features of these algorithms for bitslice implementations, we first extend the recent speed records of Goudarzi and Rivain (presented at Euroc...
In order to fulfill the organization goals and objectives, multilayered network architecture and various heterogeneous server environments are used. As the network architectures are complex, there is an increased demand in information security. So each organization needs to provide sufficient network security for the known and the unknown attacks according to its goals, requirements and objecti...
Since, in the same vein as public spaces, urban green spaces play a significant role in establishing social interactions in the Iranian cities, security concerns need to be taken more seriously in such places than other social environments, the insufficiency of which could diminish their functional capacity. This could in turn lead to a source of subsequent difficulties in urban spaces. Therefo...
Managed Security Services (MSS) have become an essential asset for companies to have in order to protect their infrastructure from hacking attempts such as unauthorized behaviour, denial of service (DoS), malware propagation, and anomalies. A proliferation of attacks has determined the need for installing more network probes and collecting more security-related events in order to assure the bes...
Whether it is possible to construct a chosen ciphertext secure (CCA secure) public key encryption (PKE) scheme only from a chosen plaintext secure (CPA secure) one is a fundamental open problem, and the best known positive results regarding this problem are the constructions of so-called bounded CCA secure schemes. Since we can achieve the best possible security in the bounded CCA security noti...
We derive a structural model of the amount of private information that is conveyed to the market via order flows. The model is a continuous-time Kyle model in which there is public information arrival and in which the strategic trader may or may not have private information. For empirical implementation, we treat each trading day as a separate instance of the model. Monte Carlo analysis shows t...
Our intention is to use Deleuze and Guattari’s concepts of machine and territory to place the classical notion of information security in a new light. In other words, we seek to describe how information security appears if confidentiality, integrity, and availability (CIA) and identification, authentication, and authorization (IAA) are considered to constitute part of a dynamic security machine...
The self-declared Republic of Somaliland frequently features as a prominent example for ‘autonomous’ processes of peace-building and state-making. Although its population endured civil wars both before and after its unilateral declaration of independence in 1991, this internationally unrecognized de facto state enjoys not only relative peace but also a comparatively high level of overall securi...
We further the study of order-preserving symmetric encryption (OPE), a primitive for allowing efficient range queries on encrypted data, recently initiated (from a cryptographic perspective) by Boldyreva et al. (Eurocrypt ’09). First, we address the open problem of characterizing what encryption via a random order-preserving function (ROPF) leaks about underlying data (ROPF being the “ideal obj...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید