نتایج جستجو برای: tamper
تعداد نتایج: 2422 فیلتر نتایج به سال:
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, financial records, and electronic voting. Given the central role of audit logs, it is critical that they are correct and inalterable. It is not sufficient to say, “our data is correct, because we store all interactions in a...
Chip-Secured XML Access (C-SXA) is a versatile and tamper-resistant XML-based Access Right Controller embedded in a smart card. C-SXA can be used either to protect the privacy of onboard personal data or to control the flow of data extracted from an external source. Tamperresistance is inherited from the smart card for on-board data or achieved using cryptographic techniques for external data. ...
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests them as an alternative to other setup assumptions, towards achieving general UC-secure multi-party computation. On the other hand, a lot of recent research has focused on protecting security of various cryptographic p...
We suggest several methods that may allow one to completely break cryptosystems implemented in a portable hardware device such as a smart card. These cryptanalytic methods work by exploring the hardware in such a way that the pseudo-random number generator embedded in the device behaves predictably, even for a very short period of time. While these attacking methods will be discussed by standin...
To determine whether methicillin-resistant Staphylococcus aureus (MRSA) USA300 commonly caused infections among Alaska Natives, we examined clinical MRSA isolates from the Alaska Native Medical Center, Anchorage, during 2000–2006. Among Anchorage-region residents, USA300 was a minor constituent among MRSA isolates in 2000–2003 (11/68, 16%); by 2006, USA300 was the exclusive genotype identifi ed...
1,3 Department of Biotechnology, Abdul Wali Khan University Mardan, Pakistan 2 Department of Chemistry, Islamia College Peshawar (Chartered University), Pakistan 4 Khyber Medical University, Peshawar, Pakistan 5 Kohat University of Science and Technology, Kohat, Pakistan 6 Department of Agriculture, Abdul Wali Khan University Mardan, Pakistan 7 Department of Chemistry, Abdul Wali Khan Universit...
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to nd cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES). In this paper...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید