Results 41 to 50 of about 264,704 (267)

Threat analysis and defense methods of deep-learning-based data theft in data sandbox mode

open access: yesTongxin xuebao, 2021
The threat model of deep-learning-based data theft in data sandbox model was analyzed in detail, and the degree of damage and distinguishing characteristics of this attack were quantitatively evaluated both in the data processing stage and the model ...
Hezhong PAN   +5 more
doaj   +2 more sources

Side-channel based intrusion detection for industrial control systems

open access: yes, 2017
Industrial Control Systems are under increased scrutiny. Their security is historically sub-par, and although measures are being taken by the manufacturers to remedy this, the large installed base of legacy systems cannot easily be updated with state-of ...
A Beckers   +13 more
core   +1 more source

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Improved meet-in-the-middle attack on ARIA cipher

open access: yesTongxin xuebao, 2015
A study on the structure of ARIA cipher is presented. A new 4-round distinguishing property for the meet-in-the-middle attack on ARIA cipher is presented by making use of the multiset and the truncated differential char-acteristic. The new distinguishing
Man-man LI, Shao-zhen CHEN
doaj   +2 more sources

Cryptanalysis of AES-PRF and Its Dual

open access: yesIACR Transactions on Symmetric Cryptology, 2018
A dedicated pseudorandom function (PRF) called AES-PRF was proposed by Mennink and Neves at FSE 2018 (ToSC 2017, Issue 3). AES-PRF is obtained from AES by using the output of the 5-th round as the feed-forward to the output state.
Patrick Derbez   +6 more
doaj   +1 more source

The Rebound Attack and Subspace Distinguishers: Application to Whirlpool [PDF]

open access: yesJournal of Cryptology, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lamberger, Mario   +4 more
openaire   +2 more sources

Improved fuzzy vault scheme for fingerprint verification [PDF]

open access: yes, 2008
Fuzzy vault is a well-known technique to address the privacy concerns in biometric identification applications. We revisit the fuzzy vault scheme to address implementation, efficiency, and security issues encountered in its realization.
Keskinoz, Mehmet   +6 more
core  

Mechanisms of IgE‐mediated food allergy and the role of allergen‐specific B cells

open access: yesFEBS Letters, EarlyView.
Food allergy arises when allergen‐specific B cells preferentially produce immunoglobulin E (IgE) antibodies against harmless foods. This article explains the mechanisms driving IgE‐mediated reactions, highlights the central role of these B cells, and discusses how natural tolerance (NT) and oral immunotherapy (OIT) can reshape allergic immune responses.
Juan‐Felipe López   +2 more
wiley   +1 more source

Detection of false data injection attacks on power systems based on measurement-eigenvalue residual similarity test

open access: yesFrontiers in Energy Research, 2023
Existing False data injection attack (FDIA) detection methods based on measurement similarity testing have difficulty in distinguishing between actual power grid accidents and FDIAs.
Yihua Zhu   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy