نتایج جستجو برای: 4758

تعداد نتایج: 84  

Journal: :IEEE Computer 2001
Joan G. Dyer Mark Lindemann Ronald Perez Reiner Sailer Leendert van Doorn Sean W. Smith Steve H. Weingart

W ork leading toward the IBM 4758 started, arguably, in the 1980s when the Abyss project began exploring techniques to build tamper-responsive hardware and use that technology to protect against software piracy. 1,2 Influenced by this earlier work, we sought to build a secure coprocessor, defined as a tamper-responding device derived from the Abyss, Citadel, and 4755 work. We wanted to provide ...

Journal: :Nephrology Dialysis Transplantation 2023

Abstract Background and Aims Men with chronic kidney disease (CKD) progress to end-stage CKD at a faster rate than women Data for the association of sex progression are conflicting, relationship between two especially among elderly population needs understanding . Method We conducted prospective study all attending Nephrology OPD Jan 2019-Jan 2022 in Tertiary care hospital, Lucknow assessed sta...

Journal: :Joint Commission perspectives. Joint Commission on Accreditation of Healthcare Organizations 2015

The revised requirements will be displayed on The Joint Commission website at http://www.jointcommission.org/ standards_information/prepublication_standards.aspx, posted in the fall E-dition®, and published in the 2016 Comprehensive Accreditation Manual for Nursing Care Centers (CAMNCC). The box that begins below displays the revised requirements; new text is underlined, and deleted language is...

2007
Véronique Cortier Gavin Keighren Graham Steel

We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in the ATM (cash machine) network. Earlier versions of the CCA API were shown to have serious flaws, and the fixes introduced by IBM in version 2.41 had not previously been formally analysed. We first investigate IBM’s pr...

2005
Alexander Iliev Sean Smith

We investigate the use of trustworthy devices, which function as trusted third parties (TTPs), to solve general two-party Secure Function Evaluation (SFE) problems. We assume that a really trustworthy TTP device will have very limited protected memory and computation environment—a tiny TTP. This precludes trivial solutions like "just run the function in the TTP". Traditional scrambled circuit e...

Journal: :Zoology in The Middle East 2022

This paper provides an overview of the Neurigona species found in Iran. During our studies northern Iran four genus Róndani, 1856 have been collected, three which for first time Iran: helva Negrobov & Tsurikov, 1990, pallida (Fallén, 1823) and pseudolongipes Negrobov, 1987. One species, persiana Pollet Kazerani sp. n., proved new to science is described here. An identification key males five kn...

Journal: :Annals of internal medicine 2012
Michael A Polis

Patients: 4758 HIV-1 seronegative partners with HIV-infected partners (heterosexual couples) ≥ 18 years of age (62% of HIV1–negative partners were men, 97% of couples were married). Seropositive partners had CD4 cell counts ≥ 250 cells/mm3 and were not receiving or meeting local guidelines for antiretroviral therapy at enrollment. Seronegative partners had normal renal function (creatinine clea...

Journal: :Chemical reviews 2004
Chao-Yang Wang

3.8.2. Temperature Distribution Measurements 4749 3.8.3. Two-Phase Visualization 4750 3.8.4. Experimental Validation 4751 3.9. Modeling the Catalyst Layer at Pore Level 4751 3.10. Summary and Outlook 4752 4. Direct Methanol Fuel Cells 4753 4.1. Technical Challenges 4754 4.1.1. Methanol Oxidation Kinetics 4754 4.1.2. Methanol Crossover 4755 4.1.3. Water Management 4755 4.1.4. Heat Management 475...

2001
Mike Bond

Attacks are presented on the IBM 4758 CCA (the first ever security module to have achieved all round FIPS140-1 Level 4 certification) and the Visa Security Module. Two new attack principles are demonstrated. Related key attacks use known or chosen differences between two cryptographic keys. Data protected with one key can then be abused by manipulation using the other key. Meet in the middle at...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید