منابع مشابه
Implementing Pairing-Based Cryptosystems in USB Tokens
In the last decade, pairing-based cryptography has been one of the most intensively studied subjects in cryptography. Various optimization techniques have been developed to speed up the pairing computation. However, implementing a pairing-based cryptosystem in resource constrained devices has been less tried. Moreover, due to progress on solving the discrete logarithm problem (DLP), those imple...
متن کاملThe Synchrotron Radiation Monitor Upgradation in Nsrrc
Synchrotron radiation monitor in the storage has been operated for a long time. This system is upgrading to booster operation now. The basic system includes optics, digital image acquisition, image analysis, compressed image transportation and visualization tools at workstation. The linearity and dynamic of new is discussed for some beam physics study. This system is also supported to the boost...
متن کاملSlc Energy Spectrum Monitor Using Synchrotron Radiation’
The SLAC Liiac is being upgraded for the use in the SLAC Linear Collider (SLC). The improved Linac must accelerate electron and positron bunches from 1.2 GeV to 50 GeV while producing output energy spectra of about 0.2 %. The energy spectra must be maintained during operation to provide for good beam transmission and to minimize chromatic effects in the SLC ARCs and Find Focus. The energy spect...
متن کاملThe LISA PathFinder DMU and Radiation Monitor
The LISA PathFinder DMU (Data Management Unit) flight model was formally accepted by ESA and ASD on 11 February 2010, after all hardware and software tests had been successfully completed. The diagnostics items are scheduled to be delivered by the end of 2010. In this paper we review the requirements and performance of this instrumentation, specially focusing on the Radiation Monitor and the DM...
متن کاملUSB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs
The Universal Serial Bus (USB) is the most prominent interface for connecting peripheral devices to computers. USB-connected input devices, such as keyboards, cardswipers and fingerprint readers, often send sensitive information to the computer. As such information is only sent along the communication path from the device to the computer, it was hitherto thought to be protected from potentially...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nuclear Technology and Radiation Protection
سال: 2006
ISSN: 1451-3994,1452-8185
DOI: 10.2298/ntrp0602073d