نتایج جستجو برای: software countermeasure
تعداد نتایج: 441146 فیلتر نتایج به سال:
In order to satisfy the equivalence principle, any non-conventional mechanism proposed to gravitationally explain the Pioneer anomaly, in the form in which it is presently known from the so-far analyzed Pioneer 10/11 data, cannot leave out of consideration its impact on the motion of the planets of the Solar System as well, especially those orbiting in the regions in which the anomalous behavio...
Multi-application smart card technology has gained momentum due to the Near Field Communication (NFC) and smart phone revolution. Enabling multiple applications from di erent application providers on a single smart card is not a new concept. Multi-application smart cards have been around since the late 1990s; however, uptake was severely limited. NFC has recently reinvigorated the multi-applica...
During the Web era e-procurement has witnessed a steep rise in marketplace deployment; this has been followed by a substantial number of failures. A number of larger technology providers are now left to support both small and large businesses. Flexibility has been a key enabler in supporting network evolution across a varied number of domains. The aim of this study is to investigate flexibility...
Low Entropy Masking Schemes (LEMS) are a recent countermeasure against side-channel attacks. They aim at reducing the randomness requirements of masking schemes under certain (adversarial and implementation) conditions. Previous works have put forward the interest of this approach when such conditions are met. We complement these investigations by analyzing LEMS against adversaries and implemen...
As the course of economy globalization and trade liberalization have been speeding up, the protective in the international trade have changed greatly. Especially in the recent years, it is widely recognized that technical barriers to trade create numerous obstacles to the international exchange of primary and processed products in The EU and US markets. This article proposes the definition and ...
The deployment of a drone swarm from carrier aircraft can support critical operations in which target should be protected by ground-based radar detection. To successful as countermeasure, the drones that are involved must equipped with proper payload systems and geometry among units well designed. This paper describes development scaled electromagnetically obscure Different configurations were ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید