Results 101 to 110 of about 2,326,402 (364)
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption ...
Marcin Aftowicz+3 more
doaj +1 more source
Mitochondria contain two mitoribosome rescue factors, ICT1 and MTRFR (C12orf65). ICT1 also functions as a mitoribosomal protein in mice and humans, and its loss is lethal. Although Mtrfr knockout mice could not be generated, knockout zebrafish lines for ict1 and mtrfr were established.
Nobukazu Nameki+11 more
wiley +1 more source
In this paper, we analyze the performance of regularized channel inversion (RCI) precoding in multiple-input single-output (MISO) broadcast channels with confidential messages under transmit-side channel correlation.
Al-nahari, Azzam Y.+3 more
core +1 more source
The K+‐Cl− cotransporters (KCCs) facilitate the symport of ions across the plasma membrane. They participate in physiological processes including neuronal regulation. Here, we characterized KCCs from Drosophila and Hydra vulgaris. Comparative analyses of transporters provide insights into the mechanism of KCC ion transport, regulation, and evolution ...
Satoshi Fudo+4 more
wiley +1 more source
Side-Channel Analysis of Chaos-Based Substitution Box Structures
There is a theoretically strong relationship between chaos and cryptology. In practice, one of the most successful applications of this relationship is chaos-based s-box structures.
Mehmet Sahin Acikkapi+2 more
doaj +1 more source
Abstract Purpose Sparing pharyngeal constrictor muscles (PCMs) during radiotherapy improves patient‐reported swallowing function. This study aimed to explore the feasibility of integrating knowledge‐based planning (KBP) with multicriteria optimization (MCO) in Eclipse v18.0 to selectively spare PCM, quantify the required trade‐off in prophylactic ...
Laura K. Howard+3 more
wiley +1 more source
A software approach to defeating side channels in last-level caches
We present a software approach to mitigate access-driven side-channel attacks that leverage last-level caches (LLCs) shared across cores to leak information between security domains (e.g., tenants in a cloud).
Arcangeli A.+6 more
core +1 more source
Protection of Oscillator-Based PUFs against Side Channel Analyses by Random Interruption
Oscillation-based physical unclonable functions (PUFs) are known to be sensitive to power trace side channel analyses (SCAs). Although previous work investigated on countermeasures, these required significant additional amount of hardware or were just ...
Holger Mandry+4 more
doaj +1 more source
Side-Channel Analysis for Detecting Protocol Tunneling
Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side channel vulnerabilities that leak information about tunneled protocols. We first discuss the timing side channels that have been found in protocol tunneling tools.
Bhanu, H.+6 more
openaire +3 more sources
Abstract Purpose Lattice radiation therapy (LRT) is a form of spatially fractionated radiation therapy that allows increased total dose delivery aiming for improved treatment response without an increase in toxicities, commonly utilized for palliation of bulky tumors.
Libing Zhu+9 more
wiley +1 more source