Results 201 to 210 of about 132,876 (242)

Real-World Mobile Health Implementation and Patient Safety: Multicenter Qualitative Study.

open access: yesJ Med Internet Res
Su JJ   +9 more
europepmc   +1 more source

The RpfB switch is a novel B12-sensing riboswitch regulating (non-replicating) persistence inMycobacterium tuberculosis

open access: yes
Kipkorir T   +6 more
europepmc   +1 more source

Towards Tight Random Probing Security

2021
Proving the security of masked implementations in theoretical models that are relevant to practice and match the best known attacks of the side-channel literature is a notoriously hard problem. The random probing model is a promising candidate to contribute to this challenge, due to its ability to capture the continuous nature of physical leakage ...
Cassiers, Gaëtan   +3 more
openaire   +1 more source

Network security probe

Proceedings of the 2nd ACM Conference on Computer and communications security - CCS '94, 1994
Many current approach to access control assume all external access are dangerous. As a consequence they stop all communication and check for authorisation. We present an optimistic approach to provide security services in a network environment that do not interject the security services into the operational sequence, rather, the security services are ...
Laurent Toutain   +2 more
openaire   +2 more sources

A Tool for Security Measuring and Probe Management

2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2016
Designing and maintaining correct security countermeasures to support trustworthiness require comprehensive understanding of current security posture, i.e., Situational Awareness (SA). Security SA means that a decision maker is aware of protected assets, existing vulnerabilities, and risk mitigation techniques.
Teemu Kanstren   +2 more
openaire   +5 more sources

Probing the Security of DNA Origami

2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2018
DNA origami is a method used to program the self-assembly of nanoscale computational systems. The contribution of this paper is to probe the security of a canonical DNA origami that is often reused. The paper describes the techniques we used to design probes whose input targets the origami systems' integrity.
Koehler, Chase   +3 more
openaire   +3 more sources

Detection of probing attempts in secure ICs

2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012
Physical attacks focus on extracting information from internal parts of IC's. One way to achieve this is by means of connecting probes to wires, so that the content of internal buses and registers can be revealed. Protection against this type of attacks exists, but usually is bulky and expensive, e.g. the shielding of secured areas. This paper presents
Salvador Manich   +2 more
openaire   +2 more sources

Algebraic Decomposition for Probing Security

2015
The probing security model is very popular to prove the side-channel security of cryptographic implementations protected by masking. A common approach to secure nonlinear functions in this model is to represent them as polynomials over a binary field and to secure their nonlinear multiplications thanks to a method introduced by Ishai, Sahai and Wagner ...
Emmanuel Prouff   +3 more
openaire   +2 more sources

EM Probes Characterisation for Security Analysis

2012
Along with the vast use of cryptography in security devices came the emergence of attacks like Electro-Magnetic analysis (EMA) where the measurement of the Electro-Magnetic (EM) waves radiated from an integrated circuit are used to extract sensitive information. Several research papers have covered EMA but very few have focused on the probes used.
Mounier, Benjamin   +4 more
openaire   +2 more sources

Probe into E-Commerce Security Technology

2009 International Forum on Computer Science-Technology and Applications, 2009
Among all the restraints of the development of E-commerce, the security problem of transaction has become the key element. Meanwhile all kinds of E-commerce security technologies have attracted more and more attention and study. In order to find better solutions of E-commerce security problems, such as anti-wiretapping, anti-juggling of the information,
Yang Li, Feng Li, Ge Qingping
openaire   +2 more sources

Home - About - Disclaimer - Privacy