نتایج جستجو برای: leakage formula
تعداد نتایج: 122724 فیلتر نتایج به سال:
In this work, we show that strong leakage resilience for cryptosystems with advanced functionalitiescan be obtained quite naturally within the methodology of dual system encryption, recently introducedby Waters. We demonstrate this concretely by providing fully secure IBE, HIBE, and ABE systems whichare resilient to bounded leakage from each of many secret keys per user, as well as ...
A new generalised approach for multiple correlated sources over a wiretap network is investigated. A basic model consisting of two correlated sources where each produce a component of the common information is initially investigated. There are several cases that consider wiretapped syndromes on the transmission links and based on these cases a new quantity, the information leakage at the source...
Innovation is becoming more and more important in modern society. There are a lot of researches on different kinds of innovation but marketing innovation is one kind of innovation that has not been studied frequently before. Marketing innovation is defined as a new way in which companies can market themselves to potential or existing customers. The study shows some key elements for marketing in...
Consider the problem of information disclosure for a planner who faces two agents interacting in a state-dependent multi-action prisonersdilemma. We nd conditions under which the planner can make use of his superior information by disclosing some of it to the agents, and conditions under which such information leakage is not possible. Although the problem is entirely symmetric, the planners ...
The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the adversary obtains side-channel information from the real world implementation of these algorithms. Most of the prior works on leakage-resilient cryptography consider leakage models where the adversary has access to the leakage oracle before the challenge-ciphertext is generated (befor...
There are three major sources of leakage current today, namely the sub-threshold leakage, gate leakage and the reverse biased junction band-to-band-tunneling leakage. These currents depend on the logic state of a CMOS circuit as determined by input pattern. Consequently, there exists a pattern that will produce the highest leakage current. Previously, researchers have investigated the problem o...
This paper contributes to the recent literature on the Green Paradox (Hoel, 2011 and Harstad, 2012) that distinguishes between regulated and unregulated regions in a Hotelling framework. In our model, different grades of oil are characterized by different costs, emission factors, and underground reserves; furthermore, the clean backstop experiences cost-reducing technical change. As a result, e...
A new approach of narrowing sub-fin with little extra process cost for suppressing parasitic-channel-effect (PCE) on vertically-stacked horizontal gate-all-around (GAA) Si nanosheet field-effect-transistors (NS-FETs) is proposed. The proposed design demonstrates systematical technical advantages by calibrated 3D TCAD simulation, including 70% reduction in sub-channel gate-induced drain leakage ...
root-end filling with cement-based materials: an in vitro analysis of bacterial and dye microleakage
background: one ideal property of a root-end fi lling material is its apical sealing ability. the aim of this in vitro study was to assess bacterial and dye microleakage of white and gray mineral trioxide aggregate (wmta and gmta), portland cement and calcium-enriched mixture (cem) cement used as root-end fi lling material, and to assess the agreement between these two test methods. materials a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید