نتایج جستجو برای: attacks after radiation therapy smart

تعداد نتایج: 2440113  

2004
Hoon-Jae Lee ManKi Ahn Seongan Lim Sang-Jae Moon

In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the side channel attacks for the smart card and similar security evaluation criteria for smart card protection profiles based on the common criterion. Futhermore, we proposes the smart card security evaluation criteria f...

2009
Nan Zhang Wei Yu Xinwen Fu Sajal K. Das

We address issues related to establishing a defender’s reputation in anomaly detection against two types of attackers: (i) smart insiders, who learn from historic attacks and adapt their strategies to avoid detection/punishment, and (ii) naı̈ve attackers, who blindly launch their attacks without knowledge of the history. In this paper, we propose two novel algorithms for reputation establishment...

Journal: :IEEE Trans. Computers 2002
Thomas S. Messerges Ezzat A. Dabbish Robert H. Sloan

ÐThis paper examines how monitoring power consumption signals might breach smart-card security. Both simple power analysis and differential power analysis attacks are investigated. The theory behind these attacks is reviewed. Then, we concentrate on showing how power analysis theory can be applied to attack an actual smart card. We examine the noise characteristics of the power signals and deve...

Journal: :Computer Networks 2016
Mingkui Wei Wenye Wang

One of the most distinguished challenges in studying the aftermath of cyber attacks in smart grid lies in data-centric threats, which refer to cyber attacks aimed at gaining advantage or sabotage the infrastructure by manipulating the data exchanged in the underlying communication network. Even though such attacks are critical by itself in the information network, they will result in more serio...

2012
Wei Yu

Smart Grid, as an energy-based Cyber-Physical Sys­ tem (CPS), is a new type of power grid that will provide reliable, secure, and efficient energy transmission and distribution. As the quality of assurance of monitoring data is essential to smart grid, in this talk we will first present two dangerous false data injection attacks, which target the state estimation and energy distribution in smar...

2006
Elisabeth Oswald Stefan Mangard Christoph Herbst Stefan Tillich

In this article we describe an improved concept for secondorder differential-power analysis (DPA) attacks on masked smart card implementations of block ciphers. Our concept allows to mount secondorder DPA attacks in a rather simple way: a second-order DPA attack consists of a pre-processing step and a DPA step. Therefore, our way of performing second-order DPA attacks allows to easily assess th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید