Results 41 to 50 of about 2,622,455 (327)

Design of a new type of safety protection device for gas bottle cabinet [PDF]

open access: yesMATEC Web of Conferences, 2020
Aiming at the problem of explosion caused by leakage of flammable and explosive gas cylinder, a new type of safety protection device for gas bottle cabinet is designed to solve this problem.
Guo Lianghui, Jia Wenting
doaj   +1 more source

Protecting Cryptographic Keys against Continual Leakage [PDF]

open access: yes, 2010
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys and computing on them in a manner that preserves security even when the adversary is able to obtain information leakage during the computation on the key.
Ali Juma, Yevgeniy Vahlis
openaire   +1 more source

Radiation environment for rendezvous and docking with nuclear rockets [PDF]

open access: yes, 1972
Radiation environment data for the NERVA engine are provided which may be utilized in estimating radiation exposures associated with various space maneuvers.
Lindsey, B. A.   +2 more
core   +2 more sources

Rule Fusion of Privacy Protection Strategies for Co-Ownership Data Sharing

open access: yesMathematics, 2022
With the rapid development of social networks, personal privacy leakage has become more and more serious. A social network is a shared platform. Resources in a social network may be shared by multiple owners.
Tinghuai Ma   +4 more
doaj   +1 more source

Ozone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures

open access: yes, 2017
Time variation during program execution can leak sensitive information. Time variations due to program control flow and hardware resource contention have been used to steal encryption keys in cipher implementations such as AES and RSA.
Austin, Todd, Aweke, Zelalem Birhanu
core   +1 more source

Pitfall of the Detection Rate Optimized Bit Allocation within template protection and a remedy [PDF]

open access: yes, 2009
One of the requirements of a biometric template protection system is that the protected template ideally should not leak any information about the biometric sample or its derivatives. In the literature, several proposed template protection techniques are
Breebaart, J.   +4 more
core   +2 more sources

Early Leakage Protection System of LPG (Liquefied Petroleum Gas) Based on ATMega 16 Microcontroller

open access: yes, 2018
LPG (Liquefied Petroleum Gas). LPG is a hydrocarbon gas production from refineries and gas refinery with the major components of propane gas (C3H8) and butane (C4H10). Limit flame (Flammable Range) or also called gas with air. Value Lower Explosive Limit
Sriwati   +5 more
semanticscholar   +1 more source

Present situation and development trend of control and protection technology for mine-used combined switch

open access: yesGong-kuang zidonghua, 2019
Present situation of control and protection technology for mine-used combined switch was introduced from aspects of short circuit protection, overload protection, leakage lockout and leakage protection, transient overvoltage protection and temperature ...
YANG Fan, CHEN Jiang
doaj   +1 more source

Universal Leakage Elimination

open access: yes, 2004
``Leakage'' errors are particularly serious errors which couple states within a code subspace to states outside of that subspace thus destroying the error protection benefit afforded by an encoded state.
A. Bohm   +12 more
core   +1 more source

Non-malleable codes for space-bounded tampering [PDF]

open access: yes, 2017
Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010—are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t.
A Faonio   +30 more
core   +2 more sources

Home - About - Disclaimer - Privacy