Results 21 to 30 of about 4,115,069 (292)

The Fascist Moment: Security, Exclusion, Extermination [PDF]

open access: yes, 2009
Security is cultivated and mobilized by enacting exclusionary practices, and exclusion is cultivated and realized on security grounds. This article explores the political dangers that lie in this connection, dangers which open the door to a fascist ...
Neocleous, M
core   +3 more sources

Inconsistency of Simulation and Practice in Delay-based Strong PUFs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
The developments in the areas of strong Physical Unclonable Functions (PUFs) predicate an ongoing struggle between designers and attackers. Such a combat motivated the atmosphere of open research, hence enhancing PUF designs in the presence of Machine ...
Anita Aghaie, Amir Moradi
doaj   +1 more source

Second-Order SCA Security with almost no Fresh Randomness

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Masking schemes are among the most popular countermeasures against Side-Channel Analysis (SCA) attacks. Realization of masked implementations on hardware faces several difficulties including dealing with glitches.
Aein Rezaei Shahmirzadi, Amir Moradi
doaj   +1 more source

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yes, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.   +2 more
core   +3 more sources

A survey on cyber security for smart grid communications [PDF]

open access: yes, 2012
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core   +1 more source

Countermeasures against Static Power Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In recent years it has been demonstrated convincingly that the standby power of a CMOS chip reveals information about the internally stored and processed data.
Thorben Moos, Amir Moradi
doaj   +1 more source

Reve\{a,i\}ling the risks: a phenomenology of information security [PDF]

open access: yes, 2009
In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have.
Pieters, Wolter
core   +4 more sources

Standard Lattice-Based Key Encapsulation on Embedded Devices

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016, Bos et al.
James Howe   +3 more
doaj   +1 more source

Enhancing security incident response follow-up efforts with lightweight agile retrospectives [PDF]

open access: yes, 2017
Security incidents detected by organizations are escalating in both scale and complexity. As a result, security incident response has become a critical mechanism for organizations in an effort to minimize the damage from security incidents.
Glisson, William Bradley   +2 more
core   +2 more sources

Deep Learning Side-Channel Collision Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj   +1 more source

Home - About - Disclaimer - Privacy