نتایج جستجو برای: tamper

تعداد نتایج: 2422  

2004
Richard T. Snodgrass Shilong Yao Christian S. Collberg

Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, financial records, and electronic voting. Given the central role of audit logs, it is critical that they are correct and inalterable. It is not sufficient to say, “our data is correct, because we store all interactions in a...

Journal: :Comput. Syst. Sci. Eng. 2005
Luc Bouganim François Dang Ngoc Philippe Pucharel

Chip-Secured XML Access (C-SXA) is a versatile and tamper-resistant XML-based Access Right Controller embedded in a smart card. C-SXA can be used either to protect the privacy of onboard personal data or to control the flow of data extracted from an external source. Tamperresistance is inherited from the smart card for on-board data or achieved using cryptographic techniques for external data. ...

2010
Seung Geol Choi Aggelos Kiayias Tal Malkin

The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests them as an alternative to other setup assumptions, towards achieving general UC-secure multi-party computation. On the other hand, a lot of recent research has focused on protecting security of various cryptographic p...

2007
Yuliang Zheng Tsutomu Matsumoto

We suggest several methods that may allow one to completely break cryptosystems implemented in a portable hardware device such as a smart card. These cryptanalytic methods work by exploring the hardware in such a way that the pseudo-random number generator embedded in the device behaves predictably, even for a very short period of time. While these attacking methods will be discussed by standin...

2011
Michael Z. David Karen M. Rudolph Thomas W. Hennessy Diana L. Zychowski Karthik Asthi Susan Boyle-Vavra Robert S. Daum

To determine whether methicillin-resistant Staphylococcus aureus (MRSA) USA300 commonly caused infections among Alaska Natives, we examined clinical MRSA isolates from the Alaska Native Medical Center, Anchorage, during 2000–2006. Among Anchorage-region residents, USA300 was a minor constituent among MRSA isolates in 2000–2003 (11/68, 16%); by 2006, USA300 was the exclusive genotype identifi ed...

2014
Abdul Wali Khan Riaz Ahmad Khan Ashfaq Ur Rahman Abdul Jabbar Shad Ali Khan Amjad Iqbal Nasir Ahmad Abdul Wadood Taj Ur Rahman

1,3 Department of Biotechnology, Abdul Wali Khan University Mardan, Pakistan 2 Department of Chemistry, Islamia College Peshawar (Chartered University), Pakistan 4 Khyber Medical University, Peshawar, Pakistan 5 Kohat University of Science and Technology, Kohat, Pakistan 6 Department of Agriculture, Abdul Wali Khan University Mardan, Pakistan 7 Department of Chemistry, Abdul Wali Khan Universit...

2011
Eli Biham Adi Shamir

In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to nd cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES). In this paper...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید