نتایج جستجو برای: tamper shape
تعداد نتایج: 192340 فیلتر نتایج به سال:
We suggest several methods that may allow one to completely break cryptosystems implemented in a portable hardware device such as a smart card. These cryptanalytic methods work by exploring the hardware in such a way that the pseudo-random number generator embedded in the device behaves predictably, even for a very short period of time. While these attacking methods will be discussed by standin...
To determine whether methicillin-resistant Staphylococcus aureus (MRSA) USA300 commonly caused infections among Alaska Natives, we examined clinical MRSA isolates from the Alaska Native Medical Center, Anchorage, during 2000–2006. Among Anchorage-region residents, USA300 was a minor constituent among MRSA isolates in 2000–2003 (11/68, 16%); by 2006, USA300 was the exclusive genotype identifi ed...
1,3 Department of Biotechnology, Abdul Wali Khan University Mardan, Pakistan 2 Department of Chemistry, Islamia College Peshawar (Chartered University), Pakistan 4 Khyber Medical University, Peshawar, Pakistan 5 Kohat University of Science and Technology, Kohat, Pakistan 6 Department of Agriculture, Abdul Wali Khan University Mardan, Pakistan 7 Department of Chemistry, Abdul Wali Khan Universit...
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to nd cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES). In this paper...
This paper describes a two instruction-stream (twoprocess) model for tamper resistance. One process (Monitor process, M-Process) is designed explicitly to monitor the control flow of the main program process (P-Process). The compilation phase compiles the software into two co-processes: P-process and M-process. The monitor process contains the control flow consistency conditions for the P-proce...
It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high performance at the same time. In 2011, Li and Lee showed that both Hsiang-Shih’s password-based remote user authentication schemes are vulnerable to various attacks if the smart card is non-tamper resistant. Consequently,...
Digital image fragile watermarking is an information hiding technique which adds the watermark into the host image for authentication .while achieving the high integrity one should not compromise with quality distortion of images. numbers of watermarking schemes exist today for balancing between the tamper detection rate and quality of reconstructed images in propose scheme we aim at maintain h...
This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...
As important special engineering equipment, tamper is used to complete the work of construction and maintenance in the railway field. In the present market, tampers are mostly mechanically driven and exist technical limitations. A new electro-hydraulic exciter applied on new tamper is proposed. It is mainly composed of new spin valve and new micro-displacement oscillation cylinder. In the paper...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید