Results 81 to 90 of about 32,602 (220)

Phase-Remapping Attack in Practical Quantum Key Distribution Systems

open access: yes, 2006
Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain ...
B. Qi   +11 more
core   +2 more sources

Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection

open access: yesThe Journal of Supercomputing
Current Hardware Trojan (HT) detection techniques are mostly developed based on a limited set of HT benchmarks. Existing HT benchmark circuits are generated with multiple shortcomings, i.e., i) they are heavily biased by the designers' mindset when created, and ii) they are created through a one-dimensional lens, mainly the signal activity of nets.
Sarihi, Amin   +3 more
openaire   +2 more sources

Infection control in the brain and the eye

open access: yesActa Ophthalmologica, EarlyView.
Abstract The Central Nervous System (CNS), comprising the brain and the eye, is considered to have a ‘privileged’ mechanism for dealing with immunological challenge (immune privilege, IP). CNS IP has been revealed through experiments using foreign protein antigens and cell and tissue alloantigens (grafts), but evidence for a role for IP in modulating ...
John V. Forrester   +2 more
wiley   +1 more source

Practical security bounds against the Trojan-horse attack in quantum key distribution

open access: yes, 2015
In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical
Choi, Iris   +5 more
core   +2 more sources

Hardware Trojan Detection Using Graph Neural Networks

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities around the world. The risk of using untrusted third-Party Intellectual Property (3PIP) is the possibility for adversaries to insert malicious modifications ...
Rozhin Yasaei   +3 more
openaire   +2 more sources

China inside out: Explaining silver flows in the triangular trade, c. 1820s‒70s

open access: yesThe Economic History Review, EarlyView.
Abstract This paper analyses a new large dataset of silver prices, as well as silver and merchandise trade flows in and out of China in the crucial decades of the mid‐nineteenth century when the Empire was opened to world trade. Silver flows were associated with the interaction between heterogeneous monetary preferences and availability of specific ...
Alejandra Irigoin   +2 more
wiley   +1 more source

Hardware Trojan Detection Using Controlled Circuit Aging

open access: yesIEEE Access, 2020
This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC.
Virinchi Roy Surabhi   +6 more
doaj   +1 more source

Civilly Disobeying What? On Directness and Relevance in Civil Disobedience

open access: yesEuropean Journal of Philosophy, EarlyView.
Abstract Recent acts of civil disobedience in protest against politicians' inaction about climate change have often targeted works of art to provoke public opinion on the issue. Such initiatives have attracted criticism from those who object to this form of political dissent.
Federico Zuolo
wiley   +1 more source

CERT strategy to deal with phishing attacks

open access: yes, 2017
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core   +1 more source

Designing for Sustainability: Emerging Professional Roles and Capabilities for Designers in the 21st Century

open access: yesInternational Journal of Art &Design Education, EarlyView.
Abstract Design Practice is shifting towards transdisciplinary, collaborative and problem‐based approaches in response to complex challenges of a changing world including societal issues and the climate crisis. However, the nature of emerging roles for designers aiming to contribute to sustainability transitions, and the capabilities that empower ...
Charlotte Kessler, Janice Rieger
wiley   +1 more source

Home - About - Disclaimer - Privacy