Results 51 to 60 of about 3,209,774 (327)
Toward Exposing Timing-Based Probing Attacks in Web Applications
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web
Jian Mao +4 more
doaj +1 more source
Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization
High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the ...
Hassan A. Alterazi +6 more
doaj +1 more source
In-secure identities: On the securitization of abnormality [PDF]
Highly-securitized sites, such as airports, are increasingly using screening methods designed to purge racial profiling from their practices. In these contexts, profiling methods are not only seen as unlawful, but are also perceived as ineffective from a
Amir, Merav, Kotef, Hagar
core +1 more source
PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries
A decisive contribution to the all-embracing protection of cryptographic software, especially on embedded devices, is the protection against Side-Channel Analysis (SCA) attacks.
Jannik Zeitschner +2 more
semanticscholar +1 more source
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
This work introduces second-order masked implementation of LED, Midori, Skinny, and Prince ciphers which do not require fresh masks to be updated at every clock cycle.
Tim Beyne +3 more
doaj +1 more source
On the Average Random Probing Model
Masking is one of the main countermeasures against side-channel analysis since it relies on provable security. In this context, “provable” means that a security bound can be exhibited for the masked implementation through a theoretical analysis in a ...
Julien Béguinot, Loïc Masure
doaj +1 more source
Bit t-SNI Secure Multiplication Gadget for Inner Product Masking
Masking is a sound countermeasure to protect against differential power analysis. Since the work by Balasch et al. in ASIACRYPT 2012, inner product masking has been explored as an alternative to the well known Boolean masking.
John Gaspoz, Siemen Dhooghe
doaj +1 more source
Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new masked multiplication algorithm that satisfies a recently introduced notion called Probe-Isolating Non-Interference (PINI).
Gaëtan Cassiers +1 more
doaj +1 more source
Secure Communications using Nonlinear Silicon Photonic Keys
We present a secure communication system constructed using pairs of nonlinear photonic physical unclonable functions (PUFs) that harness physical chaos in integrated silicon micro-cavities.
Bosworth, Bryan T. +5 more
core +1 more source
Detection of selfish manipulation of carrier sensing in 802.11 networks [PDF]
Recently, tuning the clear channel assessment (CCA) threshold in conjunction with power control has been considered for improving the performance of WLANs.
Eidenbenz, S +3 more
core +1 more source

