نتایج جستجو برای: fatigue countermeasure

تعداد نتایج: 74370  

2013
Le Minh Sang Tran Bjørnar Solhaug Ketil Stølen

Security risk analysis should be conducted regularly to maintain an acceptable level of security. In principle, all risks that are unacceptable according to the predefined criteria should be mitigated. However, risk mitigation comes at a cost, and only the countermeasures that cost-efficiently mitigate risks should be implemented. This paper presents an approach to integrate the countermeasure ...

2013
Le Minh Sang Tran

Existing risk assessment methods often rely on a context of a target software system at a particular point in time. Such contexts of long-living software systems tend to evolve over time. Consequently, risks might also evolve. Therefore, in order to deal with evolving risks, decision makers need to select an appropriate risk countermeasure alternative that is more resilient to evolution than ot...

2005
G. Fraidy Bouesse Marc Renaudin Gilles Sicard

The purpose of this paper is to propose a design technique for improving the resistance of the Quasi Delay Insensitive (QDI) Asynchronous logic against Differential Power Analysis Attacks. This countermeasure exploits the properties of the QDI circuit acknowledgement signals to introduce temporal variations so as to randomly desynchronize the data processing times. The efficiency of the counter...

2008
Yu Yan

The market share of railway transportation is in the downwards trend. In order to reverse this trend, the railway has taken a series of countermeasures which have resulted in obvious effects. 1.To set up the railway freight and passenger transport marketing system which can meet the requirement of market. 2.To make the railway transport enterprises operational mechanism be matched with market e...

Albert Ford Eugene Vida Maina Michael Robinson,

The Highway Safety Manual [HSM, 2010] recommends safety evaluations be performed before implementing any roadway treatment to predict the expected safety consequences. Safety consequences can be measured using crash prediction models, Crash Modification Factor (CMFs), or both. This paper develops a CMF to show the expected impact of red-light cameras (RLCs) on safety at signalized intersections...

Journal: :Optics express 2013
Toshimori Honjo Mikio Fujiwara Kaoru Shimizu Kiyoshi Tamaki Shigehito Miki Taro Yamashita Hirotaka Terai Zhen Wang Masahide Sasaki

We propose a countermeasure against the so-called tailored bright illumination attack for differential-phase-shift QKD (DPS-QKD). By monitoring a rate of coincidence detection at a pair of superconducting nanowire single-photon detectors (SSPDs) which is connected at each of the output ports of Bob's Mach-Zehnder interferometer, Alice and Bob can detect and defeat this kind of attack. We also e...

Journal: :Image Vision Comput. 2005
Longjiang Yu Xiamu Niu Sheng-He Sun

With multimedia developing rapidly, copyright protection and authentication is more and more important. Digital watermark is one of the most efficient methods to protect multimedia products. Print and scan attack is a challenging problem for most of digital watermarks. In this paper, the geometric distortion and halftone in print-and-scan process is analyzed for the sake of presenting a model o...

2015
Nadia El Mrabet Emmanuel Fouotsa

Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols. Some of these protocols are suitable for implementation on power constrained devices such as smart cards or smartphone which are subject to side channel attacks. In this paper, we analyse the efficiency of the point blinding countermeasure in pairing based cryptography ag...

Journal: :IACR Cryptology ePrint Archive 2016
Jean-Sébastien Coron Aurélien Greuet Emmanuel Prouff Rina Zeitoun

We describe a new technique for improving the efficiency of the masking countermeasure against side-channel attacks. Our technique is based on using common shares between secret variables, in order to reduce the number of finite field multiplications. Our algorithms are proven secure in the ISW probing model with n > t + 1 shares against t probes. For AES, we get an equivalent of 2.8 nonlinear ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید