Results 41 to 50 of about 2,622,455 (327)
Design of a new type of safety protection device for gas bottle cabinet [PDF]
Aiming at the problem of explosion caused by leakage of flammable and explosive gas cylinder, a new type of safety protection device for gas bottle cabinet is designed to solve this problem.
Guo Lianghui, Jia Wenting
doaj +1 more source
Protecting Cryptographic Keys against Continual Leakage [PDF]
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys and computing on them in a manner that preserves security even when the adversary is able to obtain information leakage during the computation on the key.
Ali Juma, Yevgeniy Vahlis
openaire +1 more source
Radiation environment for rendezvous and docking with nuclear rockets [PDF]
Radiation environment data for the NERVA engine are provided which may be utilized in estimating radiation exposures associated with various space maneuvers.
Lindsey, B. A. +2 more
core +2 more sources
Rule Fusion of Privacy Protection Strategies for Co-Ownership Data Sharing
With the rapid development of social networks, personal privacy leakage has become more and more serious. A social network is a shared platform. Resources in a social network may be shared by multiple owners.
Tinghuai Ma +4 more
doaj +1 more source
Ozone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures
Time variation during program execution can leak sensitive information. Time variations due to program control flow and hardware resource contention have been used to steal encryption keys in cipher implementations such as AES and RSA.
Austin, Todd, Aweke, Zelalem Birhanu
core +1 more source
Pitfall of the Detection Rate Optimized Bit Allocation within template protection and a remedy [PDF]
One of the requirements of a biometric template protection system is that the protected template ideally should not leak any information about the biometric sample or its derivatives. In the literature, several proposed template protection techniques are
Breebaart, J. +4 more
core +2 more sources
Early Leakage Protection System of LPG (Liquefied Petroleum Gas) Based on ATMega 16 Microcontroller
LPG (Liquefied Petroleum Gas). LPG is a hydrocarbon gas production from refineries and gas refinery with the major components of propane gas (C3H8) and butane (C4H10). Limit flame (Flammable Range) or also called gas with air. Value Lower Explosive Limit
Sriwati +5 more
semanticscholar +1 more source
Present situation of control and protection technology for mine-used combined switch was introduced from aspects of short circuit protection, overload protection, leakage lockout and leakage protection, transient overvoltage protection and temperature ...
YANG Fan, CHEN Jiang
doaj +1 more source
``Leakage'' errors are particularly serious errors which couple states within a code subspace to states outside of that subspace thus destroying the error protection benefit afforded by an encoded state.
A. Bohm +12 more
core +1 more source
Non-malleable codes for space-bounded tampering [PDF]
Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010—are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t.
A Faonio +30 more
core +2 more sources

