نتایج جستجو برای: leakage

تعداد نتایج: 30774  

Introduction: Leakage of cerebrospinal fluid in the skull base may be accompanied with recurrent meningitis. The site of leakage may either be anterior (in the nose and paranasal sinuses) or posterior (in the temporal bone). Various imaging techniques can be used to precisely locate the point of leakage but despite all the advances in imaging techniques there are still some rare cases in which ...

2017
Wei Yang Yuchen Cao Ke Ma Hailong Zhang

Side-channel attacks (SCAs) have been a realistic serious threat to crypto devices. Therefore, evaluating the SCAs resilience of a crypto device is important and necessary. The SCAs-secure evaluation criteria includes the information theoretic metric and the security metric. The former metric, i.e. mutual information (MI), measures the leakage amount of a crypto device. However, because the rea...

Journal: :IACR Cryptology ePrint Archive 2014
David Galindo Johann Großschädl Zhe Liu Praveen Kumar Vadnala Srinivas Vivek

Leakage-resilient cryptography aims to extend the rigorous guarantees achieved through the provable security paradigm to physical implementations. The constructions and mechanisms designed on basis of this new approach inevitably suffer from an Achilles heel: a bounded leakage assumption is needed. Currently, a huge gap exists between the theory of such designs and their implementation to confi...

2016
Ilan Komargodski

Most cryptographic schemes are designed in a model where perfect secrecy of the secret key is assumed. In most physical implementations, however, some form of information leakage is inherent and unavoidable. To deal with this, a flurry of works showed how to construct basic cryptographic primitives that are resilient to various forms of leakage. Dodis et al. (FOCS ’10) formalized and constructe...

Introduction: Oxygen central is one of the vital parts of the hospital that is responsible for supplying oxygen. The occurrence of any defect can result in fatality and finansial damage. Therefore, effective risk analysis is very importance in preventing and mitigating such potential accidents.The purpose of this study was to analyze the scenarios of accidents in the oxygen central unit of the ...

2014
Lingjun Meng Kashif Nawaz Jing He Anthony M. Jacobi Andrew J. Nelson Lingjun MENG Kashif NAWAZ Jing HE Anthony M. JACOBI Andrew J. NELSON Mark D. GINSBERG

The effects of building leakage on heat and mass transfer in buildings are difficult to model due to the difficulty in knowing crack size, shape, position, and number. Nevertheless, interest remains high in the estimation of crack areas in buildings because of the important effects cracks have on infiltration, indoor air quality, building energy performance, and because of interest in exploring...

2016
Louise A. Dennis Marija Slavkovik Michael Fisher

We examine the use of model-checking in the analysis of information leakage in social networks. We take previous work on the formal analysis of digital crowds and show how a variation on the formalism can naturally model the interaction of people and groups of followers in intersecting social networks. We then show how probabilistic models of the forwarding and reposting behaviour of individual...

Journal: :journal of agricultural science and technology 2010
m. j. arvin d. j. donnelly

ten solanum tuberosum cultivars and accessions from 11 wild solanum species were evaluated for their tolerance to salt (200 mm nacl or 100 mm na2so4), drought (35% peg), cold (-4ºc) and heat (37ºc). evaluation was based on electrolyte leakage from de-tached leaves of in vitro plantlets. testing involved a rinsing treatment with three changes of distilled water to remove electrolytes from leaf a...

Journal: :Theor. Comput. Sci. 2013
Fabrizio Biondi Axel Legay Pasquale Malacaria Andrzej Wasowski

The quantification of information leakage provides a quantitative evaluation of the security of a system. We propose the usage of Markovian processes to model deterministic and probabilistic systems. By using a methodology generalizing the lattice of information approach we model refined attackers capable to observe the internal behavior of the system, and quantify the information leakage of su...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید