Results 31 to 40 of about 4,138,516 (290)

On the Difficulty of FSM-based Hardware Obfuscation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy.
Marc Fyrbiak   +6 more
doaj   +1 more source

Searching for Subspace Trails and Truncated Differentials

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Grassi et al. [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subspaces and used it to give the first five round distinguisher for Aes.
Gregor Leander   +2 more
doaj   +1 more source

IT Security in the Higher Education Institutions [PDF]

open access: yes, 2012
This paper investigates the level of prioritization and degree of implementation of IT security in higher education institutions (HEIs) in the Philippines. A total of 95 HEIs in the Philippines were evaluated in the study.
Marcial, D. E. (Dave)
core   +1 more source

Human Security: Undermining Human Rights? [PDF]

open access: yes, 2012
This article warns that the human security discourse and agenda could inadvertently undermine the international human rights regime. Insofar as human security identifies new threats to well-being, new victims of those threats, new duties of states, or ...
Howard-Hassmann, Rhoda E.
core   +3 more sources

Boolean Masking for Arithmetic Additions at Arbitrary Order in Hardware

open access: yesApplied Sciences, 2022
Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and lattice-based post-quantum secure schemes. In order to protect devices that execute these algorithms against side-channel attacks, countermeasures such as
Florian Bache, Tim Güneysu
doaj   +1 more source

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities

open access: yesDigital Communications and Networks, 2023
Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during trying times, such as the ongoing COVID-19 pandemic ...
Heba Saleous   +6 more
doaj   +1 more source

Scrutinising the secret state: parliamentary oversight of the intelligence and security agencies [PDF]

open access: yes, 2010
This article considers the growing parliamentary scrutiny of the intelligence and security agencies. It raises a number of questions about the role and effectiveness of the Intelligence and Security Committee, Parliament and ...
Bochel, Hugh   +2 more
core   +1 more source

Dammarenediol II enhances etoposide‐induced apoptosis by targeting O‐GlcNAc transferase and Akt/GSK3β/mTOR signaling in liver cancer

open access: yesMolecular Oncology, EarlyView.
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee   +8 more
wiley   +1 more source

Combined Threshold Implementation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Physical security is an important aspect of devices for which an adversary can manipulate the physical execution environment. Recently, more and more attention has been directed towards a security model that combines the capabilities of passive and ...
Jakob Feldtkeller   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy