Results 1 to 10 of about 1,709 (155)

Memoria y cuerpo(s) fragmentado(s). Una relectura a la obra “Fantomas o mi memoria incomunicada” de Nancy Gewölb

open access: yesINDEX Revista de Arte Contemporáneo, 2022
El artículo aborda una de las primeras obras de la artista chilena Nancy Gewölb (1939-), llamada “Fantomas o mi memoria incomunicada” realizada en el Centro Cultural Estación Mapocho en el año 1982, en medio de un contexto dictatorial marcado por la ...
Marla Freire Smith
doaj   +2 more sources

Eficacia antirradiación de la máscara facial en cardiología intervencionista: un estudio con fantomas

open access: yesRevista Chilena de Radiología, 2023
Antecedentes: La eficacia de las máscaras faciales plomo-acrílicas atenuadoras de radiación utilizadas en cardiología intervencionista ha sido poco estudiada.
Alejandro Prieto-López   +4 more
doaj   +2 more sources

Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM

open access: yesCryptography, 2019
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi   +3 more
doaj   +2 more sources

Evaluación de Modelo Docente Utilizando Fantomas de Bajo Costo para Entrenamiento en Reparación de Episiotomía.

open access: yesARS Medica, 2020
Introducción: El creciente aumento de los alumnos de pregrado, asociado a la disminución en el número de partos, han reducido la exposición de los alumnos a procedimientos como la episiotomí­a.
José Andrés Poblete   +6 more
doaj   +2 more sources

Estudo da distribuição de doses utilizando Fantomas Antropomórficos e Dosímetros TL

open access: yesBrazilian Journal of Radiation Sciences
Este estudo avaliou a distribuição de doses em protocolos radioterápicos utilizando feixes de cone beam (100 kVp) e 6 MV em dois fantomas antropomórficos: um crânio impresso tridimensionalmente (3D) e o fantoma Alderson, com dosímetros ...
Pedro Henrique Dias Vieira   +4 more
doaj   +2 more sources

Modelos para práctica de ultrasonografía pediátrica con Fantomas caseros: Ideas y destrezas [PDF]

open access: yesRevista Chilena de Anestesia
Karla Itzel Gutiérrez Riveroll   +2 more
doaj   +2 more sources

Fantômas: Understanding Face Anonymization Reversibility [PDF]

open access: yesProceedings on Privacy Enhancing Technologies, 2022
Face images are a rich source of information that can be used to identify individuals and infer private information about them. To mitigate this privacy risk, anonymizations employ transformations on clear images to obfuscate sensitive information, all ...
Julian Todt   +2 more
semanticscholar   +1 more source

Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists

open access: yesIET Computers &Digital Techniques, Volume 17, Issue 3-4, Page 75-88, May-July 2023., 2023
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley   +1 more source

Experimental evaluation of differential fault attack on lightweight block cipher PIPO

open access: yesIET Information Security, Volume 17, Issue 1, Page 80-88, January 2023., 2023
Abstract The recent development of Internet of Things (IoT) devices has increased related security issues. Because of the rapid increase in the use of these devices, the possibility of accessing and hijacking cryptographic devices is increasing. Consequently, active research on cryptographic technologies capable of providing a safe environment even in ...
SeongHyuck Lim, Dong‐Guk Han
wiley   +1 more source

LLSFIoT: Lightweight Logical Security Framework for Internet of Things

open access: yesWireless Communications and Mobile Computing, Volume 2021, Issue 1, 2021., 2021
Current research in Internet of Things (IoT) is focused on the security enhancements to every communicated message in the network. Keeping this thought in mind, researcher in this work emphasizes on a security oriented cryptographic solution. Commonly used security cryptographic solutions are heavy in nature considering their key size, operations, and ...
Isha Batra   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy