نتایج جستجو برای: countermeasures

تعداد نتایج: 9039  

Journal: :Journal of Information Processing and Management 2000

Journal: :Nature Biotechnology 2004

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2015

2002
Kouichi Itoh Jun Yajima Masahiko Takenaka Naoya Torii

We propose three differential power analysis (DPA) countermeasures for securing the public key cryptosystems. All countermeasures are based on the window method, and can be used in both RSA and elliptic curve cryptosystems (ECC). By using the optimal countermeasure, performance penalty is small. In comparison with k-ary method, computation time of our countermeasure is only 105% in 1024-bit RSA...

2012
Kenn Beer

The Parliamentary Road Safety Committee, in its Inquiry into Safety at Røilway Level Crossings Safety in 2009, suggested infrasf ucture treatments including perceptual countermeasures, enforcsment camoras, variable speed limits, improved lighting and Yellow Box Markings. The Victorian Railway I-evel Crossing Safety Steering Committee has identified possible countermeasures, including rumble str...

Journal: :Scientific Bulletin of Naval Academy 2016

Journal: :IEEE Trans. Information Forensics and Security 2015
Nicholas W. D. Evans Stan Z. Li Sébastien Marcel Arun Ross

While biometrics technology has created new solutions to person authentication and has evolved to play a critical role in personal, national and global security, the potential for the technology to be fooled or spoofed is now widely acknowledged. For example, fingerprint verification systems can be spoofed with a synthetic material, such as gelatine, inscribed with the fingerprint ridges of an ...

2003
Victor D. Sawma Robert L. Probert

Existing authentication models for e-commerce systems take into account satisfying legitimate user requirements described in security standards. Yet, the process of introducing countermeasures to block malicious user requirements is ad hoc and relies completely on the security designer expertise. This leads to expensive implementation life cycles if defects related to the design model were disc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید