نتایج جستجو برای: attacks after radiation therapy smart

تعداد نتایج: 2440113  

2016
Raj Kumar

Mobile security has become a crucial aspect of mobile computing. People are maintaining their confidential and valuable information on smart phones. Most of the users and businesses use smart phones as message tools, and means of scheduling and establishing their work and private life. Smart phones contain increasing amount of exposed information to which access must be prohibited. But security...

2017
Eric Zeng Shrirang Mare Franziska Roesner Paul G. Allen

The Internet of Things is becoming increasingly widespread in home environments. Consumers are transforming their homes into smart homes, with internet-connected sensors, lights, appliances, and locks, controlled by voice or other user-defined automations. Security experts have identified concerns with IoT and smart homes, including privacy risks as well as vulnerable and unreliable devices. Th...

2017
Eric Zeng Shrirang Mare Franziska Roesner

The Internet of Things is becoming increasingly widespread in home environments. Consumers are transforming their homes into smart homes, with internet-connected sensors, lights, appliances, and locks, controlled by voice or other user-defined automations. Security experts have identified concerns with IoT and smart homes, including privacy risks as well as vulnerable and unreliable devices. Th...

Journal: :JNW 2013
Ding Wang Chunguang Ma Qi-Ming Zhang Sendong Zhao

It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high performance at the same time. In 2011, Li and Lee showed that both Hsiang-Shih’s password-based remote user authentication schemes are vulnerable to various attacks if the smart card is non-tamper resistant. Consequently,...

2009

Smart phones are increasingly being equipped with operating systems that compare in complexity with those on desktop computers. This trend makes smart phone operating systems vulnerable to many of the same threats as desktop operating systems. This paper examines the threat posed by rootkits to smart phones. Rootkits are malware that stealthily achieve their goals by modifying operating system ...

Journal: :IACR Cryptology ePrint Archive 2002
Wieland Fischer Christophe Giraud Erik Woodward Knudsen Jean-Pierre Seifert

For speeding up elliptic curve scalar multiplication and making it secure against side-channel attacks such as timing or power analysis, various methods have been proposed using speci cally chosen elliptic curves. We show that both goals can be achieved simultaneously even for conventional elliptic curves over Fp . This result is shown via two facts. First, we recall the known fact that every e...

2017
Rebecca Kassubek Martin Gorges Mike-Andrew Westhoff Albert C. Ludolph Jan Kassubek Hans-Peter Müller

OBJECTIVE To investigate radiation therapy-induced microstructural damage of white matter in patients with high-grade glioma by diffusion tensor imaging (DTI). METHODS DTI was performed in 18 patients with high-grade glioma (WHO grades III and IV) and 13 healthy controls. DTI images were cross-sectionally aligned for the calculation of baseline fractional anisotropy (FA). Interhemispheric FA ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید