Results 31 to 40 of about 4,138,516 (290)
On the Difficulty of FSM-based Hardware Obfuscation
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy.
Marc Fyrbiak +6 more
doaj +1 more source
Searching for Subspace Trails and Truncated Differentials
Grassi et al. [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subspaces and used it to give the first five round distinguisher for Aes.
Gregor Leander +2 more
doaj +1 more source
IT Security in the Higher Education Institutions [PDF]
This paper investigates the level of prioritization and degree of implementation of IT security in higher education institutions (HEIs) in the Philippines. A total of 95 HEIs in the Philippines were evaluated in the study.
Marcial, D. E. (Dave)
core +1 more source
Human Security: Undermining Human Rights? [PDF]
This article warns that the human security discourse and agenda could inadvertently undermine the international human rights regime. Insofar as human security identifies new threats to well-being, new victims of those threats, new duties of states, or ...
Howard-Hassmann, Rhoda E.
core +3 more sources
Boolean Masking for Arithmetic Additions at Arbitrary Order in Hardware
Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and lattice-based post-quantum secure schemes. In order to protect devices that execute these algorithms against side-channel attacks, countermeasures such as
Florian Bache, Tim Güneysu
doaj +1 more source
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié +13 more
wiley +1 more source
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities
Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during trying times, such as the ongoing COVID-19 pandemic ...
Heba Saleous +6 more
doaj +1 more source
Scrutinising the secret state: parliamentary oversight of the intelligence and security agencies [PDF]
This article considers the growing parliamentary scrutiny of the intelligence and security agencies. It raises a number of questions about the role and effectiveness of the Intelligence and Security Committee, Parliament and ...
Bochel, Hugh +2 more
core +1 more source
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source
Combined Threshold Implementation
Physical security is an important aspect of devices for which an adversary can manipulate the physical execution environment. Recently, more and more attention has been directed towards a security model that combines the capabilities of passive and ...
Jakob Feldtkeller +3 more
doaj +1 more source

