نتایج جستجو برای: countermeasures

تعداد نتایج: 9039  

2015
Jianqiang Xin

........................................................................................................... 4 Document Conventions................................................................................... 4 Introduction.................................................................................................... 5 Overview of VoIP techniques..........................................

2012
Léo Ducas Phong Q. Nguyen

NTRUSign is the most practical lattice signature scheme. Its basic version was broken by Nguyen and Regev in 2006: one can efficiently recover the secret key from about 400 signatures. However, countermeasures have been proposed to repair the scheme, such as the perturbation used in NTRUSign standardization proposals, and the deformation proposed by Hu et al. at IEEE Trans. Inform. Theory in 20...

An experimental study has been conducted on the effectiveness of two types of flow-altering countermeasures placed around a cylindrical pier under clear water condition, which include sacrificial piles and submerged vanes. Their arrangements follow the optimal configurations recommended in the published articles with some modification. The temporal evolution of maximum scour depth and its equil...

2013
Aurélie Bauer Éliane Jaulmes Emmanuel Prouff Justine Wild

Since the introduction of side-channel attacks in the nineties, RSA implementations have been a privileged target. A wide variety of countermeasures have been proposed and most of practical attacks are nowadays efficiently defeated by them. However, in a recent work published at ICICS 2010, Clavier et al. have pointed out that almost all the existing countermeasures were ineffective if the atta...

2009
Nobuo Shuto Koji Fujima

The tsunami science and engineering began in Japan, the country the most frequently hit by local and distant tsunamis. The gate to the tsunami science was opened in 1896 by a giant local tsunami of the highest run-up height of 38 m that claimed 22,000 lives. The crucial key was a tide record to conclude that this tsunami was generated by a "tsunami earthquake". In 1933, the same area was hit ag...

Journal: :IACR Cryptology ePrint Archive 2009
Emmanuelle Dottax Christophe Giraud Matthieu Rivain Yannick Sierra

Since their publication in 1996, Fault Attacks have been widely studied from both theoretical and practical points of view and most of cryptographic systems have been shown vulnerable to this kind of attacks. Until recently, most of the theoretical fault attacks and countermeasures used a fault model which assumes that the attacker is able to disturb the execution of a cryptographic algorithm o...

Journal: :EAI Endorsed Trans. Indust. Netw. & Intellig. Syst. 2015
Eric McCary Yang Xiao

The term “Smart Grid” has been coined and used for several years to describe the efforts of the current power grid modernization effort. This effort plans to introduce self-healing, energy efficiency, reliability, and security using two-way digital communications and control technology, along with a host of other valuable attributes. As a bi-product of this modernization and newly gained system...

2008
Thomas C Bryan

Network security is a long-standing and well-recognized problem in the computing world. Protecting information is a main priority of a network administrator, with security techniques becoming increasingly robust. As more and more information has become digital, security of this digital information has tightened and mitigation techniques to protect the information have become more complex. While...

2002
Kathryn Stewart

The primary goal of rehabilitative programs for drunk driving offenders is to reduce the probability of subsequent drinking and driving. Punishment, such as licensing penalties, lines, and incarceration, is also designed to prevent subsequent drinking and driving either by making the consequences of arrest so unpleasant and costly as to discourage the offense or by eliminating the offenders’ ca...

2009
Alessandro Acquisti Lorrie Cranor Jason Hong

As the battle against phishing continues, many questions remain about where stakeholders should place their efforts to achieve effective prevention, speedy detection, and fast action. Do stakeholders have sufficient incentives to act? What should be the top priorities for the anti-phishing community? To provide insights into these questions we conducted 31 in-depth interviews with anti-phishing...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید