Results 101 to 110 of about 2,326,402 (364)

Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning

open access: yesFuture Internet
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption ...
Marcin Aftowicz   +3 more
doaj   +1 more source

Knockout of the mitoribosome rescue factors Ict1 or Mtrfr is viable in zebrafish but not mice: compensatory mechanisms underlying each factor's loss

open access: yesFEBS Open Bio, EarlyView.
Mitochondria contain two mitoribosome rescue factors, ICT1 and MTRFR (C12orf65). ICT1 also functions as a mitoribosomal protein in mice and humans, and its loss is lethal. Although Mtrfr knockout mice could not be generated, knockout zebrafish lines for ict1 and mtrfr were established.
Nobukazu Nameki   +11 more
wiley   +1 more source

Linear Precoding for Broadcast Channels with Confidential Messages under Transmit-Side Channel Correlation

open access: yes, 2013
In this paper, we analyze the performance of regularized channel inversion (RCI) precoding in multiple-input single-output (MISO) broadcast channels with confidential messages under transmit-side channel correlation.
Al-nahari, Azzam Y.   +3 more
core   +1 more source

Biophysical characterization and ion transport with cell‐based and proteoliposome reconstitution assays of invertebrate K+‐Cl− cotransporters

open access: yesFEBS Open Bio, EarlyView.
The K+‐Cl− cotransporters (KCCs) facilitate the symport of ions across the plasma membrane. They participate in physiological processes including neuronal regulation. Here, we characterized KCCs from Drosophila and Hydra vulgaris. Comparative analyses of transporters provide insights into the mechanism of KCC ion transport, regulation, and evolution ...
Satoshi Fudo   +4 more
wiley   +1 more source

Side-Channel Analysis of Chaos-Based Substitution Box Structures

open access: yesIEEE Access, 2019
There is a theoretically strong relationship between chaos and cryptology. In practice, one of the most successful applications of this relationship is chaos-based s-box structures.
Mehmet Sahin Acikkapi   +2 more
doaj   +1 more source

Advantages and limitations of navigation‐based multicriteria optimization (MCO) in selectively sparing pharyngeal constrictor muscles in head and neck radiotherapy treatment planning

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose Sparing pharyngeal constrictor muscles (PCMs) during radiotherapy improves patient‐reported swallowing function. This study aimed to explore the feasibility of integrating knowledge‐based planning (KBP) with multicriteria optimization (MCO) in Eclipse v18.0 to selectively spare PCM, quantify the required trade‐off in prophylactic ...
Laura K. Howard   +3 more
wiley   +1 more source

A software approach to defeating side channels in last-level caches

open access: yes, 2016
We present a software approach to mitigate access-driven side-channel attacks that leverage last-level caches (LLCs) shared across cores to leak information between security domains (e.g., tenants in a cloud).
Arcangeli A.   +6 more
core   +1 more source

Protection of Oscillator-Based PUFs against Side Channel Analyses by Random Interruption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Oscillation-based physical unclonable functions (PUFs) are known to be sensitive to power trace side channel analyses (SCAs). Although previous work investigated on countermeasures, these required significant additional amount of hardware or were just ...
Holger Mandry   +4 more
doaj   +1 more source

Side-Channel Analysis for Detecting Protocol Tunneling

open access: yesAdvances in Internet of Things, 2011
Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side channel vulnerabilities that leak information about tunneled protocols. We first discuss the timing side channels that have been found in protocol tunneling tools.
Bhanu, H.   +6 more
openaire   +3 more sources

Simulation‐free workflow for lattice radiation therapy using deep learning predicted synthetic computed tomography: A feasibility study

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose Lattice radiation therapy (LRT) is a form of spatially fractionated radiation therapy that allows increased total dose delivery aiming for improved treatment response without an increase in toxicities, commonly utilized for palliation of bulky tumors.
Libing Zhu   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy