Results 201 to 210 of about 132,876 (242)
Real-World Mobile Health Implementation and Patient Safety: Multicenter Qualitative Study.
Su JJ+9 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Towards Tight Random Probing Security
2021Proving the security of masked implementations in theoretical models that are relevant to practice and match the best known attacks of the side-channel literature is a notoriously hard problem. The random probing model is a promising candidate to contribute to this challenge, due to its ability to capture the continuous nature of physical leakage ...
Cassiers, Gaëtan+3 more
openaire +1 more source
Proceedings of the 2nd ACM Conference on Computer and communications security - CCS '94, 1994
Many current approach to access control assume all external access are dangerous. As a consequence they stop all communication and check for authorisation. We present an optimistic approach to provide security services in a network environment that do not interject the security services into the operational sequence, rather, the security services are ...
Laurent Toutain+2 more
openaire +2 more sources
Many current approach to access control assume all external access are dangerous. As a consequence they stop all communication and check for authorisation. We present an optimistic approach to provide security services in a network environment that do not interject the security services into the operational sequence, rather, the security services are ...
Laurent Toutain+2 more
openaire +2 more sources
A Tool for Security Measuring and Probe Management
2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2016Designing and maintaining correct security countermeasures to support trustworthiness require comprehensive understanding of current security posture, i.e., Situational Awareness (SA). Security SA means that a decision maker is aware of protected assets, existing vulnerabilities, and risk mitigation techniques.
Teemu Kanstren+2 more
openaire +5 more sources
Probing the Security of DNA Origami
2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2018DNA origami is a method used to program the self-assembly of nanoscale computational systems. The contribution of this paper is to probe the security of a canonical DNA origami that is often reused. The paper describes the techniques we used to design probes whose input targets the origami systems' integrity.
Koehler, Chase+3 more
openaire +3 more sources
Detection of probing attempts in secure ICs
2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012Physical attacks focus on extracting information from internal parts of IC's. One way to achieve this is by means of connecting probes to wires, so that the content of internal buses and registers can be revealed. Protection against this type of attacks exists, but usually is bulky and expensive, e.g. the shielding of secured areas. This paper presents
Salvador Manich+2 more
openaire +2 more sources
Algebraic Decomposition for Probing Security
2015The probing security model is very popular to prove the side-channel security of cryptographic implementations protected by masking. A common approach to secure nonlinear functions in this model is to represent them as polynomials over a binary field and to secure their nonlinear multiplications thanks to a method introduced by Ishai, Sahai and Wagner ...
Emmanuel Prouff+3 more
openaire +2 more sources
EM Probes Characterisation for Security Analysis
2012Along with the vast use of cryptography in security devices came the emergence of attacks like Electro-Magnetic analysis (EMA) where the measurement of the Electro-Magnetic (EM) waves radiated from an integrated circuit are used to extract sensitive information. Several research papers have covered EMA but very few have focused on the probes used.
Mounier, Benjamin+4 more
openaire +2 more sources
Probe into E-Commerce Security Technology
2009 International Forum on Computer Science-Technology and Applications, 2009Among all the restraints of the development of E-commerce, the security problem of transaction has become the key element. Meanwhile all kinds of E-commerce security technologies have attracted more and more attention and study. In order to find better solutions of E-commerce security problems, such as anti-wiretapping, anti-juggling of the information,
Yang Li, Feng Li, Ge Qingping
openaire +2 more sources