نتایج جستجو برای: level attack

تعداد نتایج: 1152212  

Journal: :the journal of tehran university heart center 0
afsoon fazlinezhad ghaem hospital, mashhad university of medical sciences, mashhad, iran. sara azimi ghaem hospital, mashhad university of medical sciences, mashhad, iran. mahmoodreza azarpazhooh ghaem hospital, mashhad university of medical sciences, mashhad, iran. mohammad khajedaluee ghaem hospital, mashhad university of medical sciences, mashhad, iran. mohsen mahdinezhad kashani islamic azad university, mashhad branch, mashhad, iran.

background: stroke, one of the most important causes of morbidity and mortality in the world, is of great importance in young adults (15-45 years), amongst whom the causes of stroke and transient ischemic attack (tia) are different from those in older ages and a significant portion of them have no known etiology. patent foramen ovale (pfo) is considered a probable cause in this group. methods: ...

Journal: :IACR Cryptology ePrint Archive 2009
Matthieu Rivain Emmanuel Prouff Julien Doget

Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually applied to thwart them: masking and operations shuffling. To benefit from the advantages of the two techniques, recent works have proposed to combine them. However, the schemes which have been designed until now only...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده ادبیات و علوم انسانی 1391

with the introduction of communicative language teaching, a large number of studies have concerned with students’ oral participation in language classrooms. although the importance of classroom participation is evident, some language learners are unwilling to engage in oral activities. this passivity and unwillingness to participate in language classroom discussions is known as “reticence”. rev...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1390

the present research study attempted to find out the extent to which two pre-task activities of “glossary of unknown vocabulary items” and “content related support” assisted efl language learners with their performance on listening comprehension questions across two different proficiency levels (low and high). data for this study were obtained from a total of 120 language learners, female and m...

Journal: :مجله دانشگاه علوم پزشکی کرمانشاه 0
alireza ray dept. of cardiology, school of medicine, kermanshah university of medical sciences , kermanshah shirin rashidi shahpasandi dept. of cardiology, school of medicine, kermanshah university of medical sciences , kermanshah parastou shirvani emam ali hospital, kermanshah university of medical sciences , kermanshah

background: normokalemic periodic paralysis is an autosomal dominant disorder involving the abnormal function of skeletal muscle’s voltage-gated alpha-subunits. it is characterized by paralysis attack of varying severity with concomitant normal serum potassium concentration. although normokalemic periodic paralysis is well established in the literature, but its cardiac manifestations are very r...

In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...

Journal: :Cryptologia 2007
Mark Stamp Wing On Chan

In this paper we consider an attack on the SIGABA cipher under the assumption that the largest practical keyspace is used. The attack highlights various strengths and weaknesses of SIGABA and provides insight into the inherent level of security provided by the cipher.

Journal: :IEICE Transactions 2005
Dong-Wook Lee Dong-Soo Har

Cryptosystems for smartcard are required to provide protection from Differential Power Analysis (DPA) attack. Self-timed circuit based cryptosystems demonstrate considerable resistance against DPA attack, but they take substantial circuit area. A novel approach offering up to 30% area reduction and maintaining DPA protection level close to DIMS scheme is proposed. key words: DPA, self-timed cir...

2011
Dang Vinh Pham Joss Wright Dogan Kesdogan

The Minimal-Hitting-Set attack (HS-attack) [10] is a well-known passive intersection attack against Mix-based anonymity systems, applicable in cases where communication behaviour is non-uniform and unknown. The attack allows an observer to identify uniquely the fixed set of communication partners of a particular user by observing the messages of all senders and receivers using a Mix. Whilst the...

Journal: :ACM Transactions on Intelligent Systems and Technology 2023

Deep neural networks are vulnerable to adversarial examples, even in the black-box setting where attacker is only accessible model output. Recent studies have devised effective attacks with high query efficiency. However, such performance often accompanied by compromises attack imperceptibility, hindering practical use of these approaches. In this article, we propose restrict perturbations a sm...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید