نتایج جستجو برای: dental leakages
تعداد نتایج: 162691 فیلتر نتایج به سال:
In side channel attack (SCA) studies, it is widely believed that unprotected implementations leak information about the intermediate states of the internal cryptographic process. However, directly recovering the intermediate states is not common practice in today’s SCA study. Instead, most SCAs exploit the leakages in a “guess-anddetermine” way, where they take a partial key guess, compute the ...
The detection and handling of data leakages is becoming a critical issue for organizations. To this end, data leakage solutions are usually employed by organizations to monitor network traffic and the use of portable storage devices. However, these solutions often produce a large number of alerts, whose analysis is time-consuming and costly for organizations. To effectively handle leakage incid...
A method for detecting and isolating incipient leakages in the valves of a pulverized coal injection vessel for a blast furnace process is presented. Nonlinear physical gray-box models of the plant are developed. Values of the unknown parameters are estimated by identification. Observers are constructed for these models and the residuals are used in a generalized likelihood ratio test. The meth...
District heating pipes are known to degenerate with time and in some cities the pipes have been used for several decades. Due to bad insulation or cracks, energy or media leakages might appear. This paper presents a complete system for large-scale monitoring of district heating networks, including methods for detection, classification and temporal characterization of (potential) leakages. The s...
Many profiling power analysis attacks estimate the multivariate probability distribution using a profiling step, and thus, can optimally combine the leakages of multiple sample points. Though there exists several approaches like filtering, Principal Component Analysis for combining the leakages of multiple sample points in non-profiling DPA, their optimality has been been rarely studied. We stu...
OBJECTIVE To date, there is no standardized treatment for esophageal perforations and leakages caused by underlying benign diseases, and it is still debated whether a conservative, endoscopic treatment or a surgical approach is preferable. However, some cases series have successfully demonstrated the feasibility of a temporary placement of self-expanding stents. DESIGN All patients with benig...
ABSTARCT: Flow measurement plays vital role in Air conditioning leak detection to measure leakages of conditioned air in a airconditioning system of the building. It is costlier process to convert properties of air into making of desired atmosphere of the building. The leakage of conditioned air is cause of loss of money. In this stems the need for accurate, economical measurement for leakages ...
Masking is a common technique to protect software implementations of symmetric cryptographic algorithms against Differential Power Analysis (DPA) attacks. The development of a properly masked version of a block cipher is an incremental and time-consuming process since each iteration of the development cycle involves a costly leakage assessment. To achieve a high level of DPA resistance, the arc...
Software-based cryptographic implementations can be vulnerable to side-channel analysis. Masking countermeasures rank among the most prevalent techniques against it, ensuring formally the protection vs. value-based leakages. However, its applicability is halted by two factors. First, a masking countermeasure involves a computational overhead that can render implementations inefficient. Second, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید