Results 31 to 40 of about 4,115,069 (292)

On the Difficulty of FSM-based Hardware Obfuscation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy.
Marc Fyrbiak   +6 more
doaj   +1 more source

IT Security in the Higher Education Institutions [PDF]

open access: yes, 2012
This paper investigates the level of prioritization and degree of implementation of IT security in higher education institutions (HEIs) in the Philippines. A total of 95 HEIs in the Philippines were evaluated in the study.
Marcial, D. E. (Dave)
core   +1 more source

Searching for Subspace Trails and Truncated Differentials

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Grassi et al. [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subspaces and used it to give the first five round distinguisher for Aes.
Gregor Leander   +2 more
doaj   +1 more source

Boolean Masking for Arithmetic Additions at Arbitrary Order in Hardware

open access: yesApplied Sciences, 2022
Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and lattice-based post-quantum secure schemes. In order to protect devices that execute these algorithms against side-channel attacks, countermeasures such as
Florian Bache, Tim Güneysu
doaj   +1 more source

Human Security: Undermining Human Rights? [PDF]

open access: yes, 2012
This article warns that the human security discourse and agenda could inadvertently undermine the international human rights regime. Insofar as human security identifies new threats to well-being, new victims of those threats, new duties of states, or ...
Howard-Hassmann, Rhoda E.
core   +3 more sources

Reclaiming the political : emancipation and critique in security studies [PDF]

open access: yes, 2012
The critical security studies literature has been marked by a shared commitment towards the politicization of security – that is, the analysis of its assumptions, implications and the practices through which it is (re)produced.
Alker H   +42 more
core   +1 more source

Personalizing the Pediatric Hematology/Oncology Fellowship: Adapting Training for the Next Generation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein   +3 more
wiley   +1 more source

COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities

open access: yesDigital Communications and Networks, 2023
Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during trying times, such as the ongoing COVID-19 pandemic ...
Heba Saleous   +6 more
doaj   +1 more source

Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus   +6 more
wiley   +1 more source

Combined Threshold Implementation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Physical security is an important aspect of devices for which an adversary can manipulate the physical execution environment. Recently, more and more attention has been directed towards a security model that combines the capabilities of passive and ...
Jakob Feldtkeller   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy