Attack on Starvation

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhanced Flush+Reload Attack on AES

In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...

متن کامل

Short-term starvation with a near-fatal asthma attack induced ketoacidosis in a nondiabetic pregnant woman

Life-threatening refractory metabolic acidosis due to starvation ketoacidosis is rarely reported, even among nondiabetic pregnant women, and may be overlooked. Furthermore, stressful situations may increase the acidosis severity.In the present case, a nondiabetic multiparous woman was admitted for a near-fatal asthma attack and vomiting during the third trimester of pregnancy. She was intubated...

متن کامل

Analysis of Ottoman Attack on Yemen: Reasons, Consequences and Results

The 10th century AH was very important for Muslim lands, including Yemen in the era of Taherian (858-945 AH), because during this time, Portugal as a colonist country, in order to have access to new maritime routes, to seize Muslim commercial centers, as well as monopoly of Indian medicine trade, was moving eastward, into Yemen. At the same time, the Ottoman Empire, which was one somehow the fl...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

A collusion attack on the fuzzy vault scheme

The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Dairy Science

سال: 1962

ISSN: 0022-0302

DOI: 10.3168/jds.s0022-0302(62)89497-1