Results 211 to 220 of about 132,876 (242)
Some of the next articles are maybe not open access.
Researchers probe security through obscurity
Communications of the ACM, 2014Obfuscation protects code by making it so impenetrable that access to it won't help a hacker understand how it works.
openaire +2 more sources
KERALA'S FOOD SECURITY STATUS—A PROBE
Journal of International Development, 2013AbstractThe Indian state of Kerala had attained international acclaim for its consistently higher level of human development comparable with that of many advanced countries even with a much lower per capita income. The present paper focuses on the food security concerns in the state, which produces less than a quarter of its food grain requirements ...
openaire +2 more sources
Private stateful circuits secure against probing attacks
Proceedings of the 2nd ACM symposium on Information, computer and communications security, 2007We discuss the following problem: how to guarantee privacy of a circuit if an adversary can eavesdrop on its wires, where the functionality of the circuit is assumed public and the adversary attempts to discover information regarding the computation, namely, input, intermediate results and output. We present a solution by introducing a private stateful
Benjamin Premkumar+2 more
openaire +1 more source
Boron‐Conjugated Pyrenes as Fluorescence‐Based Molecular Probes and Security Markers [PDF]
AbstractBoron‐embedded aromatic hydrocarbons are a class of molecules known for their distinct electronic and/or optoelectronic properties and are thus suitable for many potential applications. Among those, boronic ester and acid containing molecules have been widely used for sensing and molecular recognition applications, respectively. We compared the
Vivek Chandrakant Wakchaure+2 more
openaire +2 more sources
PIT: A Probe Into Internet of Things by Comprehensive Security Analysis
2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2019One of the major issues which are hindering widespread and seamless adoption of Internet of Thing (IoT) is security. The IoT devices are vulnerable and susceptible to attacks which became evident from a series of recent large-scale distributed denial-of-service (DDoS) attacks, leading to substantial business and financial losses.
Vinay Sachidananda+3 more
openaire +2 more sources
Post-layout Security Evaluation Methodology Against Probing Attacks
2021Probing attack is considered to be one of the most powerful attack used to break the security and extract confidential information from an embedded system. This attack requires different bespoke equipment’s and expertise. However, for the moment, there is no methodology to evaluate theoretically the security level of a design or circuit against this ...
Takarabt, Sofiane+4 more
openaire +3 more sources
Probing the Opioidergic Basis of Attachment (In)security
Biological Psychiatry: Cognitive Neuroscience and Neuroimaging, 2021Jennifer A. Bartz, Kristina Tchalova
openaire +3 more sources
The art of constructing (in)security: probing rhetorical strategies of securitisation
Journal of International Relations and Development, 2017Scholars advocating a sociological view of securitisation have criticised the Copenhagen school for its overemphasis on the grammar of security and its neglect of the social situatedness of securitisation. Accordingly, these critics have also pointed to the relevance of rhetorical strategy, that is, how agents tailor their securitising moves to ...
openaire +2 more sources
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly