Results 51 to 60 of about 3,209,774 (327)

Toward Exposing Timing-Based Probing Attacks in Web Applications

open access: yesSensors, 2017
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web
Jian Mao   +4 more
doaj   +1 more source

Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization

open access: yesSensors, 2022
High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the ...
Hassan A. Alterazi   +6 more
doaj   +1 more source

In-secure identities: On the securitization of abnormality [PDF]

open access: yes, 2017
Highly-securitized sites, such as airports, are increasingly using screening methods designed to purge racial profiling from their practices. In these contexts, profiling methods are not only seen as unlawful, but are also perceived as ineffective from a
Amir, Merav, Kotef, Hagar
core   +1 more source

PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries

open access: yesIACR Cryptology ePrint Archive, 2023
A decisive contribution to the all-embracing protection of cryptographic software, especially on embedded devices, is the protection against Side-Channel Analysis (SCA) attacks.
Jannik Zeitschner   +2 more
semanticscholar   +1 more source

Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This work introduces second-order masked implementation of LED, Midori, Skinny, and Prince ciphers which do not require fresh masks to be updated at every clock cycle.
Tim Beyne   +3 more
doaj   +1 more source

On the Average Random Probing Model

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Masking is one of the main countermeasures against side-channel analysis since it relies on provable security. In this context, “provable” means that a security bound can be exhibited for the masked implementation through a theoretical analysis in a ...
Julien Béguinot, Loïc Masure
doaj   +1 more source

Bit t-SNI Secure Multiplication Gadget for Inner Product Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Masking is a sound countermeasure to protect against differential power analysis. Since the work by Balasch et al. in ASIACRYPT 2012, inner product masking has been explored as an alternative to the well known Boolean masking.
John Gaspoz, Siemen Dhooghe
doaj   +1 more source

Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new masked multiplication algorithm that satisfies a recently introduced notion called Probe-Isolating Non-Interference (PINI).
Gaëtan Cassiers   +1 more
doaj   +1 more source

Secure Communications using Nonlinear Silicon Photonic Keys

open access: yes, 2018
We present a secure communication system constructed using pairs of nonlinear photonic physical unclonable functions (PUFs) that harness physical chaos in integrated silicon micro-cavities.
Bosworth, Bryan T.   +5 more
core   +1 more source

Detection of selfish manipulation of carrier sensing in 802.11 networks [PDF]

open access: yes, 2011
Recently, tuning the clear channel assessment (CCA) threshold in conjunction with power control has been considered for improving the performance of WLANs.
Eidenbenz, S   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy