نتایج جستجو برای: level attack

تعداد نتایج: 1152212  

2015
Marco Tiloca Francesco Racciatti Gianluca Dini

ICT is becoming a fundamental and pervasive component of critical infrastructures (CIs). Despite the advantages that it brings about, ICT also exposes CIs to a number of security attacks that can severely compromise human safety, service availability and business interests. Although it is vital to ensure an adequate level of security, it is practically infeasible to counteract all possible atta...

2013
Seonho Choi Hyeonsang Eom Edward Jung

1 This work was supported by ARO grant 48575-RT-ISP. Abstract A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resourc...

Journal: :IACR Cryptology ePrint Archive 2014
Xiutao Feng Fan Zhang

Sablier is an authenticated encryption cipher submitted to the CAESAR competition, which is composed of the encryption Sablier v1 and the authentication Au. In this work we present a state recovery attack against the encryption Sablier v1 with time complexity about 2 operations and data complexity about 24 of 16-bit keywords. Our attack is practical in the workstation. It is noticed that the up...

2011
Ahmed F. Shosha Joshua James Pavel Gladyshev

After an intrusion has propagated between hosts, or even between networks, determining the propagation path is critical to assess exploited network vulnerabilities, and also to determine the vector and intent of the initial intrusion. This work proposes a novel method for malware intrusion attack path reconstruction that extends post-mortem system state comparison methods with network-level cor...

2013
Thomas Roche Victor Lomné

In this paper we study the collision-correlation attack published by Clavier et al. at CHES 2011 on a 1-order boolean masking scheme and show its lack of robustness against unknown and high level of measurement noise. In order to improve the attack, we follow the approach that Gérard and Standaert proposed in a recent paper at CHES 2012. Then we address the problem of heterogeneous leakage poin...

Journal: :iranian journal of neurology 0
ali noureddine department of neurology, school of medicine, mashhad university of medical sciences, mashhad, iran. kavian ghandehari department of neurology, neuro cognitive research center, school of medicine, mashhad university of medical sciences, mashhad, iran. mohammad taghi shakeri department of social medicine, school of medicine, mashhad university of medical sciences, mashhad, iran.

background: previous literatures have shown a transient ischemic attack  (tia) mimic rate  of 9-31%. we aimed  to ascertain the proportion of stroke mimics amongst suspected tia patients. methods: a prospective observational study was performed in   ghaem   hospital,   mashhad,   iran   during   2012-2013. consecutive tia patients  were identified in a stroke center. the  initial diagnosis  of ...

Journal: :CoRR 2016
Nitin Rathi Asmit De Helia Naeimi Swaroop Ghosh

Spin-Transfer Torque RAM (STTRAM) is promising for cache applications. However, it brings new data security issues that were absent in volatile memory counterparts such as Static RAM (SRAM) and embedded Dynamic RAM (eDRAM). This is primarily due to the fundamental dependency of this memory technology on ambient parameters such as magnetic field and temperature that can be exploited to tamper wi...

and A. Bakhshalipour, M. R. Soltani, M. Seddighi,

The blades of wind turbines are the most important parts in producing power output. In this study, a section of a 660 KW wind turbine blade will be installed in Iran in near future was tested in a wind tunnel. In addition to steady tests, various unsteady tests including the effects of reduced frequency, mean angle of attack, and amplitudes were carried out. The preliminary results show strong ...

Journal: :Expert Syst. Appl. 2014
Joseph K. Liu Tsz Hon Yuen Man Ho Au Willy Susilo

In a recent paper, Shim (2012) presented a very interesting authentication scheme for vehicular sensor networks. Shim claimed that the scheme is secure against the highest adopted level of attack, namely the chosen-message attack (CID-CMA). Nevertheless, we find that the proof in Shim's paper does not actually prove that the scheme is secure in this level. Instead, it can only ensure that the s...

Journal: :acta medica iranica 0
mojtaba chardoli department of emergency medicine, haftom-e-tir hospital, iran university of medical sciences, tehran, iran. nader h. firoozabadi department of emergency medicine, haftom-e-tir hospital, iran university of medical sciences, tehran, iran. mohsen nouri department of neurosurgery, razi hospital, zahedan university of medical sciences, zahedan, iran. vafa rahimi-movaghar sina trauma and surgery research center, tehran university of medical sciences, tehran, iran.

cerebrovascular attack (cva) and transient ischemic attack (tia) are major causes of emergency department visits around the globe. a significant number of these patients may experience repeat attacks if left untreated. several risk stratifying scoring systems have been developed in recent years to point out the high risk patients. abcd 2 is based on age, blood pressure, clinical status, diabete...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید