Secure Assay Execution on MEDA Biochips to Thwart Attacks Using Real-Time Sensing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks

The threat of voice spam, commonly known as Spam over Internet Telephony (SPIT) is a real and contemporary problem. If the problem remains unchecked then it may become as potent as email spam today. In this paper, we present two approaches to detect and prevent SPITting over the Internet. Both of our approaches are based on the anomaly detection of the distributions of selected call features (i...

متن کامل

Real-time cell-impedance sensing assay as an alternative to clonogenic assay in evaluating cancer radiotherapy.

Intrinsic radiosensitivity of normal and tumour tissues has been shown to be an independent prognostic factor for patients' response to radiotherapy. This study compares the real-time cell-impedance sensing (RT-CES) assay with the conventional clonogenic assay in terms of in-vitro radiosensitivity. One objective in this study was to predict in-vivo response to gold nanoparticle (GNP) treatment ...

متن کامل

How to Thwart Birthday Attacks against MACs via Small Randomness

The security of randomized message authentication code, MAC for short, is typically depending on the uniqueness of random initial vectors (IVs). Thus its security bound usually contains O(q/2), when random IV is n bits and q is the number of MACed messages. In this paper, we present how to break this birthday barrier without increasing the randomness. Our proposal is almost as efficient as the ...

متن کامل

Current Mask generation: an analogical circuit to thwart DPA attacks

This work addresses the leakage information problem concerning cryptographic circuits. Physical implementations of cryptographic algorithms may let escape some side channel information, like electromagnetic emanations, temperature, computing time, and power consumption. With these information, an attacker can retrieve the data that is being computed, like cryptographic keys. This paper proposes...

متن کامل

SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks

In this paper, we explain that by only applying a simple filtering algorithm into various proxy systems, almost all phishing attacks can be blocked without loss of convenience to the user. We propose a system based on a simple filtering algorithm which we call the Sanitizing Proxy System (SPS). The key idea of SPS is that Web phishing attack can be immunized by removing part of the content that...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Design Automation of Electronic Systems

سال: 2020

ISSN: 1084-4309,1557-7309

DOI: 10.1145/3374213