Results 81 to 90 of about 32,602 (220)
Phase-Remapping Attack in Practical Quantum Key Distribution Systems
Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain ...
B. Qi +11 more
core +2 more sources
Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection
Current Hardware Trojan (HT) detection techniques are mostly developed based on a limited set of HT benchmarks. Existing HT benchmark circuits are generated with multiple shortcomings, i.e., i) they are heavily biased by the designers' mindset when created, and ii) they are created through a one-dimensional lens, mainly the signal activity of nets.
Sarihi, Amin +3 more
openaire +2 more sources
Infection control in the brain and the eye
Abstract The Central Nervous System (CNS), comprising the brain and the eye, is considered to have a ‘privileged’ mechanism for dealing with immunological challenge (immune privilege, IP). CNS IP has been revealed through experiments using foreign protein antigens and cell and tissue alloantigens (grafts), but evidence for a role for IP in modulating ...
John V. Forrester +2 more
wiley +1 more source
Practical security bounds against the Trojan-horse attack in quantum key distribution
In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical
Choi, Iris +5 more
core +2 more sources
Hardware Trojan Detection Using Graph Neural Networks
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities around the world. The risk of using untrusted third-Party Intellectual Property (3PIP) is the possibility for adversaries to insert malicious modifications ...
Rozhin Yasaei +3 more
openaire +2 more sources
China inside out: Explaining silver flows in the triangular trade, c. 1820s‒70s
Abstract This paper analyses a new large dataset of silver prices, as well as silver and merchandise trade flows in and out of China in the crucial decades of the mid‐nineteenth century when the Empire was opened to world trade. Silver flows were associated with the interaction between heterogeneous monetary preferences and availability of specific ...
Alejandra Irigoin +2 more
wiley +1 more source
Hardware Trojan Detection Using Controlled Circuit Aging
This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC.
Virinchi Roy Surabhi +6 more
doaj +1 more source
Civilly Disobeying What? On Directness and Relevance in Civil Disobedience
Abstract Recent acts of civil disobedience in protest against politicians' inaction about climate change have often targeted works of art to provoke public opinion on the issue. Such initiatives have attracted criticism from those who object to this form of political dissent.
Federico Zuolo
wiley +1 more source
CERT strategy to deal with phishing attacks
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core +1 more source
Abstract Design Practice is shifting towards transdisciplinary, collaborative and problem‐based approaches in response to complex challenges of a changing world including societal issues and the climate crisis. However, the nature of emerging roles for designers aiming to contribute to sustainability transitions, and the capabilities that empower ...
Charlotte Kessler, Janice Rieger
wiley +1 more source

