Results 91 to 100 of about 462,135 (294)

Статистичні моделі двомісних логічних операцій для проведення інженерно-криптографічних атак за побічними каналами витоку інформації [PDF]

open access: yes, 2006
Запропоновано статистичні моделі, досліджено їх властивості та запропоновано методику проведення інженерно-криптографічних атак за побічними каналами витоку інформації на комп'ютерні реалізації логічних операцій двох змінних.For realization of logical ...
Карпінський, Микола   +1 more
core  

A Polymorphic Reconfigurable Multi‐Electrode Device Based on Electrically Bistable Nanostructured Metallic Films

open access: yesAdvanced Electronic Materials, EarlyView.
A polymorphic reconfigurable multi‐electrode device based on electrically bistable nanostructured metallic films. The adaptive reconfiguration properties of the nanostructured network under specific input voltages drive the reprogrammability of the device. This system can be employed for the implementation of polymorphic devices, which can be used both
Silvia Bressan   +4 more
wiley   +1 more source

Resource analysis and modifications of quantum computing with noisy qubits for elliptic curve discrete logarithms

open access: yesScientific Reports
We estimate the number of physical qubits and execution time by decomposing an implementation of Shor’s algorithm for elliptic curve discrete logarithms into universal gate units at the logical level when surface codes are used.
Jinyoung Ha, Jonghyun Lee, Jun Heo
doaj   +1 more source

Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes

open access: yesAlgorithms
This paper studies the security issues for cyber–physical systems, aimed at countering potential malicious cyber-attacks. The main focus is on solving the problem of extracting the most vulnerable attack path in a known attack graph, where an attack path
Eugene Levner, Dmitry Tsadikovich
doaj   +1 more source

Efficient quantum key distribution over a collective noise channel

open access: yes, 2009
We present two efficient quantum key distribution schemes over two different collective-noise channels. The accepted hypothesis of collective noise is that photons travel inside a time window small compared to the variation of noise.
C. H. Bennett   +4 more
core   +1 more source

HAMLOCK: HArdware-Model LOgically Combined attacK

open access: yes
The growing use of third-party hardware accelerators (e.g., FPGAs, ASICs) for deep neural networks (DNNs) introduces new security vulnerabilities. Conventional model-level backdoor attacks, which only poison a model's weights to misclassify inputs with a specific trigger, are often detectable because the entire attack logic is embedded within the model
Amgain, Sanskar   +4 more
openaire   +2 more sources

Concealable and Field‐Free Physical Unclonable Function Based on Voltage‐Controlled Magnetic Tunnel Junctions

open access: yesAdvanced Electronic Materials, EarlyView.
A concealable physical unclonable function (PUF) based on an array of 384 nanoscale voltage‐controlled magnetic tunnel junctions is demonstrated. The PUF operates without any external magnetic field. It uses a combination of deterministic and stochastic switching mechanisms, based on the spin transfer torque and voltage‐controlled magnetic anisotropy ...
Thomas Neuner   +6 more
wiley   +1 more source

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

open access: yesMATEC Web of Conferences, 2017
This paper aims to show the major role means of protection play for strengthening the cybersecurity of critical transport infrastructure by using the advanced method of simulation modelling.
Ivanova Yoana
doaj   +1 more source

Thin Reinforced Sulfonated Poly(phenylene sulfone) Membranes for Durable Water Electrolysis: Suppressed Swelling and Enhanced Stability Over 2000 Hours

open access: yesAdvanced Energy Materials, EarlyView.
Hydrocarbon membranes have the potential to significantly enhance the efficiency of water electrolyzers. However, their application is often limited by insufficient stability resulting from excessive swelling. This work presents a strategy to achieve efficient, safe and stable operation of a 24 µm thin hydrocarbon membrane by combining a modified ...
Clara Schare   +8 more
wiley   +1 more source

CRITIQUES OF NEOCLASSICAL ECONOMICS: AN EXAMINATION OF SOME OF THE CRITIQUES OF STEVE KEEN

open access: yesWorld Review of Political Economy, 2010
Neoclassical economics (NE) is under siege from multiple directions. Some see NE as a whole and essentially coherent theoretical system and paradigm and some not.
James M. Craven
doaj   +1 more source

Home - About - Disclaimer - Privacy