نتایج جستجو برای: tamper shape

تعداد نتایج: 192340  

2007
Yuliang Zheng Tsutomu Matsumoto

We suggest several methods that may allow one to completely break cryptosystems implemented in a portable hardware device such as a smart card. These cryptanalytic methods work by exploring the hardware in such a way that the pseudo-random number generator embedded in the device behaves predictably, even for a very short period of time. While these attacking methods will be discussed by standin...

2011
Michael Z. David Karen M. Rudolph Thomas W. Hennessy Diana L. Zychowski Karthik Asthi Susan Boyle-Vavra Robert S. Daum

To determine whether methicillin-resistant Staphylococcus aureus (MRSA) USA300 commonly caused infections among Alaska Natives, we examined clinical MRSA isolates from the Alaska Native Medical Center, Anchorage, during 2000–2006. Among Anchorage-region residents, USA300 was a minor constituent among MRSA isolates in 2000–2003 (11/68, 16%); by 2006, USA300 was the exclusive genotype identifi ed...

2014
Abdul Wali Khan Riaz Ahmad Khan Ashfaq Ur Rahman Abdul Jabbar Shad Ali Khan Amjad Iqbal Nasir Ahmad Abdul Wadood Taj Ur Rahman

1,3 Department of Biotechnology, Abdul Wali Khan University Mardan, Pakistan 2 Department of Chemistry, Islamia College Peshawar (Chartered University), Pakistan 4 Khyber Medical University, Peshawar, Pakistan 5 Kohat University of Science and Technology, Kohat, Pakistan 6 Department of Agriculture, Abdul Wali Khan University Mardan, Pakistan 7 Department of Chemistry, Abdul Wali Khan Universit...

2011
Eli Biham Adi Shamir

In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to nd cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES). In this paper...

2005
Brian Blietz Akhilesh Tyagi

This paper describes a two instruction-stream (twoprocess) model for tamper resistance. One process (Monitor process, M-Process) is designed explicitly to monitor the control flow of the main program process (P-Process). The compilation phase compiles the software into two co-processes: P-process and M-process. The monitor process contains the control flow consistency conditions for the P-proce...

Journal: :JNW 2013
Ding Wang Chunguang Ma Qi-Ming Zhang Sendong Zhao

It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high performance at the same time. In 2011, Li and Lee showed that both Hsiang-Shih’s password-based remote user authentication schemes are vulnerable to various attacks if the smart card is non-tamper resistant. Consequently,...

2015
Priyanka Patil

Digital image fragile watermarking is an information hiding technique which adds the watermark into the host image for authentication .while achieving the high integrity one should not compromise with quality distortion of images. numbers of watermarking schemes exist today for balancing between the tamper detection rate and quality of reconstructed images in propose scheme we aim at maintain h...

2015
M. A. Mohamed Abdelhameed Ibrahim

This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...

2013
Dong Han Guofang Gong Yi Liu

As important special engineering equipment, tamper is used to complete the work of construction and maintenance in the railway field. In the present market, tampers are mostly mechanically driven and exist technical limitations. A new electro-hydraulic exciter applied on new tamper is proposed. It is mainly composed of new spin valve and new micro-displacement oscillation cylinder. In the paper...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید