Results 111 to 120 of about 4,115,069 (292)
Accountability in Cloud Service Provision Ecosystems.- Information Management and Data Privacy.- Information Classification Issues.- DEICS: Data Erasure in Concurrent Software.- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation.- Cloud, Big Data and Virtualization Security.- Security of OS-Level Virtualization ...
openaire +2 more sources
Modelling the costs and benefits of Honeynets
For many IT-security measures exact costs and benefits are not known. This makes it difficult to allocate resources optimally to different security measures. We present a model for costs and benefits of so called Honeynets.
Dornseif, Maximillian, May, Sascha
core +1 more source
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source
A Deep Analysis of two Glitch-Free Hardware Masking Schemes SESYM and LMDPL
In the context of masking, which is the dominant technique for protecting cryptographic hardware designs against Side-Channel Analysis (SCA) attacks, the focus has long been on the design of masking schemes that guarantee provable security in the ...
Nicolai Müller +2 more
doaj +1 more source
Can Ti‐Based MXenes Serve as Solid Lubricants for Brake Applications? A Tribological Study
This study explores the first implementation of Ti‐based MXenes materials in brake pad friction composite material. The resulting composite material exhibits a 48% reduction in the wear rate; alongside significant improvements are observed for thermal and mechanical properties.
Eslam Mahmoud +7 more
wiley +1 more source
Fault Injection Evaluation with Statistical Analysis
A critical aspect of securing cryptographic hardware is their resistance to Fault Injection (FI) attacks, which involve the successful injection of faults into the system in operation. Specifically, a hardware design must be resilient to wellestablished
Felix Uhle, Nicolai Müller, Amir Moradi
doaj +1 more source
3D‐Printed Serial Snap‐Through Architectures for Programmable Mechanical Response
A serial snap‐through architecture is realized using compact 3D‐printed von Mises truss units arranged in a staged cascade. Their geometry and boundary conditions program multistage mechanical responses with plateaux and re‐hardening regimes. An inverted‐compliance model predicts these behaviors and enables analytical design of programmable force ...
Filipe A. Santos
wiley +1 more source
A lack of standard approaches for testing and reporting the performance of metal halide perovskites and organic semiconductor radiation detectors has resulted in inconsistent interpretation of performance parameters, impeding progress in the field. This Perspective recommends key metrics and experimental details, which are suggested for reporting in ...
Jessie A. Posar +8 more
wiley +1 more source
Reliable Out-of-Distribution Recognition of Synthetic Images
Generative adversarial networks (GANs) and diffusion models (DMs) have revolutionized the creation of synthetically generated but realistic-looking images.
Anatol Maier, Christian Riess
doaj +1 more source
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana +2 more
wiley +1 more source

