Results 211 to 220 of about 132,876 (242)
Some of the next articles are maybe not open access.

Researchers probe security through obscurity

Communications of the ACM, 2014
Obfuscation protects code by making it so impenetrable that access to it won't help a hacker understand how it works.
openaire   +2 more sources

KERALA'S FOOD SECURITY STATUS—A PROBE

Journal of International Development, 2013
AbstractThe Indian state of Kerala had attained international acclaim for its consistently higher level of human development comparable with that of many advanced countries even with a much lower per capita income. The present paper focuses on the food security concerns in the state, which produces less than a quarter of its food grain requirements ...
openaire   +2 more sources

Private stateful circuits secure against probing attacks

Proceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
We discuss the following problem: how to guarantee privacy of a circuit if an adversary can eavesdrop on its wires, where the functionality of the circuit is assumed public and the adversary attempts to discover information regarding the computation, namely, input, intermediate results and output. We present a solution by introducing a private stateful
Benjamin Premkumar   +2 more
openaire   +1 more source

Boron‐Conjugated Pyrenes as Fluorescence‐Based Molecular Probes and Security Markers [PDF]

open access: possibleChemPlusChem, 2019
AbstractBoron‐embedded aromatic hydrocarbons are a class of molecules known for their distinct electronic and/or optoelectronic properties and are thus suitable for many potential applications. Among those, boronic ester and acid containing molecules have been widely used for sensing and molecular recognition applications, respectively. We compared the
Vivek Chandrakant Wakchaure   +2 more
openaire   +2 more sources

PIT: A Probe Into Internet of Things by Comprehensive Security Analysis

2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2019
One of the major issues which are hindering widespread and seamless adoption of Internet of Thing (IoT) is security. The IoT devices are vulnerable and susceptible to attacks which became evident from a series of recent large-scale distributed denial-of-service (DDoS) attacks, leading to substantial business and financial losses.
Vinay Sachidananda   +3 more
openaire   +2 more sources

Post-layout Security Evaluation Methodology Against Probing Attacks

2021
Probing attack is considered to be one of the most powerful attack used to break the security and extract confidential information from an embedded system. This attack requires different bespoke equipment’s and expertise. However, for the moment, there is no methodology to evaluate theoretically the security level of a design or circuit against this ...
Takarabt, Sofiane   +4 more
openaire   +3 more sources

Probing the Opioidergic Basis of Attachment (In)security

Biological Psychiatry: Cognitive Neuroscience and Neuroimaging, 2021
Jennifer A. Bartz, Kristina Tchalova
openaire   +3 more sources

The art of constructing (in)security: probing rhetorical strategies of securitisation

Journal of International Relations and Development, 2017
Scholars advocating a sociological view of securitisation have criticised the Copenhagen school for its overemphasis on the grammar of security and its neglect of the social situatedness of securitisation. Accordingly, these critics have also pointed to the relevance of rhetorical strategy, that is, how agents tailor their securitising moves to ...
openaire   +2 more sources

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

IEEE Communications Surveys and Tutorials, 2021
Bo-chao Cheng   +2 more
exaly  

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

IEEE Communications Surveys and Tutorials, 2020
Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly  

Home - About - Disclaimer - Privacy