نتایج جستجو برای: attacks after radiation therapy smart

تعداد نتایج: 2440113  

Journal: :journal of biomedical physics and engineering 0
b. j. allan experimental radiation oncology school of medicine university of western sydney, liverpool 2170 nsw australia

background: the fundamental principles of internal targeted alpha therapy for cancer were established many decades ago.the high linear energy transfer (let) of alpha radiation to the targeted cancer cellscauses double strand breaks in dna. at the same time, the short range radiation spares adjacent normal tissues. this targeted approach complements conventional external beam radiotherapy and ch...

2006
Michael Tunstall

Sensitive systems that are based on smart cards use well-studied and well-developed cryptosystems. Generally these cryptosystems have been subject to rigorous mathematical analysis in an effort to uncover cryptographic weaknesses in the system. The cryptosystems used in smart cards are, therefore, not usually vulnerable to these types of attacks. Since smart cards are small objects that can be ...

2012
James B. Mitchell Miriam R. Anver Anastasia L. Sowers Philip S. Rosenberg Maria Figueroa Angela Thetford Murali C. Krishna Paul S. Albert John A. Cook

There is significant interest in the development of agents that can ameliorate radiation damage after exposure to radiation has occurred. Here we report that chronic supplementation of the antioxidant Tempol in the diet of mice can reduce body weight without toxicity, decrease cancer, and extend survival when administered after nonlethal total body radiation (TBI). These effects were apparent i...

2006
Jacques J. A. Fournier Michael Tunstall

This paper describes possible attacks against software implementations of AES running on processors with cache mechanisms, particularly in the case of smart cards. These attacks are based on sidechannel information gained by observing cache hits and misses in the current drawn by the smart card. Two different attacks are described. The first is a combination of ideas proposed in [2] and [11] to...

Journal: :IEICE Transactions 2005
Dae Hyun Yum Pil Joong Lee

The well-known S/KEY one-time password scheme was designed to counter eavesdropping and replay attacks [1]. The success of S/KEY stems from its efficiency and simplicity as well as its security property. S/KEY uses simple hash functions and does not require other complex cryptographic primitives. Even though S/KEY is immune to eavesdropping and replay attacks, it is susceptible to preplay attac...

سلیمانپور, حسن , شادور , کامران , شمس وحدتی, صمد , عباس نژاد , محسن , مرجانی, کریم ,

   Paroxysmal Permanent Junctional Reciprocating Tachycardia (PJRT) is caused after rapid and sudden pacing of excitatory foci in atrioventricular junction . While it happens mostly in infants and children, it is rarely seen in adults.  A 30-year-old female came to our emergency department repeatedly with the chief complaint of palpitation. She was later diagnosed with PSVT and throughout her s...

2006
Çetin Kaya Koç

approved: Çetin Kaya Koç Cryptographic devices leak timing and power consumption information that is easily measurable, radiation of various levels, and more. Such devices also have additional inputs, other than plaintext and keys, like voltage, which can be modified to force the device to produce certain faulty outputs that can be used to reveal the secret key. Side-channel cryptanalysis uses ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید