Design of a new type of safety protection device for gas bottle cabinet [PDF]
Aiming at the problem of explosion caused by leakage of flammable and explosive gas cylinder, a new type of safety protection device for gas bottle cabinet is designed to solve this problem.
Guo Lianghui, Jia Wenting
doaj +1 more source
The Wave of the Digital Economy: The Conflict and Balance between Data Sharing and Personal Privacy [PDF]
As modern society gradually penetrates into the era of big data, digital economy becomes an important field. Citizens’ information data is rapidly passed in the tripartite field of economy, government and individuals, and citizens’ privacy leakage is ...
Lin Xiwen +4 more
doaj +1 more source
Monolayer protection for eletrochemical migration control in silver nanocomposite [PDF]
©2006 American Institute of Physics. The electronic version of this article is the complete one and can be found online at: http://link.aip.org/link/?APPLAB/89/112112/1DOI:10.1063/1.2353813The authors introduced an effective approach of using monolayer ...
Li, Yi, Wong, C. P.
core +1 more source
Protecting Cryptographic Keys against Continual Leakage [PDF]
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys and computing on them in a manner that preserves security even when the adversary is able to obtain information leakage during the computation on the key.
Ali Juma, Yevgeniy Vahlis
openaire +1 more source
Ozone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures
Time variation during program execution can leak sensitive information. Time variations due to program control flow and hardware resource contention have been used to steal encryption keys in cipher implementations such as AES and RSA.
Austin, Todd, Aweke, Zelalem Birhanu
core +1 more source
On the relation between Differential Privacy and Quantitative Information Flow [PDF]
Differential privacy is a notion that has emerged in the community of statistical databases, as a response to the problem of protecting the privacy of the database's participants when performing statistical queries.
A. Ghosh +13 more
core +7 more sources
Rule Fusion of Privacy Protection Strategies for Co-Ownership Data Sharing
With the rapid development of social networks, personal privacy leakage has become more and more serious. A social network is a shared platform. Resources in a social network may be shared by multiple owners.
Tinghuai Ma +4 more
doaj +1 more source
``Leakage'' errors are particularly serious errors which couple states within a code subspace to states outside of that subspace thus destroying the error protection benefit afforded by an encoded state.
A. Bohm +12 more
core +1 more source
Expert-based development of a standard in CO2 sequestration monitoring technology [PDF]
Bureau of Economic ...
Hovorka, S. D. +6 more
core +1 more source
Gut microbiome and aging—A dynamic interplay of microbes, metabolites, and the immune system
Age‐dependent shifts in microbial communities engender shifts in microbial metabolite profiles. These in turn drive shifts in barrier surface permeability of the gut and brain and induce immune activation. When paired with preexisting age‐related chronic inflammation this increases the risk of neuroinflammation and neurodegenerative diseases.
Aaron Mehl, Eran Blacher
wiley +1 more source

