نتایج جستجو برای: dental leakages

تعداد نتایج: 162691  

2016
Si Gao Hua Chen Wenling Wu Limin Fan Weiqiong Cao Xiangliang Ma

In side channel attack (SCA) studies, it is widely believed that unprotected implementations leak information about the intermediate states of the internal cryptographic process. However, directly recovering the intermediate states is not common practice in today’s SCA study. Instead, most SCAs exploit the leakages in a “guess-anddetermine” way, where they take a partial key guess, compute the ...

Journal: :Journal of Computer Security 2016
Sokratis Vavilis Milan Petkovic Nicola Zannone

The detection and handling of data leakages is becoming a critical issue for organizations. To this end, data leakage solutions are usually employed by organizations to monitor network traffic and the use of portable storage devices. However, these solutions often produce a large number of alerts, whose analysis is time-consuming and costly for organizations. To effectively handle leakage incid...

Journal: :IEEE Trans. Contr. Sys. Techn. 1999
Andreas Johansson Alexander Medvedev

A method for detecting and isolating incipient leakages in the valves of a pulverized coal injection vessel for a blast furnace process is presented. Nonlinear physical gray-box models of the plant are developed. Values of the unknown parameters are estimated by identification. Observers are constructed for these models and the residuals are used in a generalized likelihood ratio test. The meth...

2014
Amanda Berg Jörgen Ahlberg

District heating pipes are known to degenerate with time and in some cities the pipes have been used for several decades. Due to bad insulation or cracks, energy or media leakages might appear. This paper presents a complete system for large-scale monitoring of district heating networks, including methods for detection, classification and temporal characterization of (potential) leakages. The s...

Journal: :IACR Cryptology ePrint Archive 2013
Suvadeep Hajra Debdeep Mukhopadhyay

Many profiling power analysis attacks estimate the multivariate probability distribution using a profiling step, and thus, can optimally combine the leakages of multiple sample points. Though there exists several approaches like filtering, Principal Component Analysis for combining the leakages of multiple sample points in non-profiling DPA, their optimality has been been rarely studied. We stu...

Journal: :Scandinavian journal of gastroenterology 2014
Christoph Gubler Peter Bauerfeind

OBJECTIVE To date, there is no standardized treatment for esophageal perforations and leakages caused by underlying benign diseases, and it is still debated whether a conservative, endoscopic treatment or a surgical approach is preferable. However, some cases series have successfully demonstrated the feasibility of a temporary placement of self-expanding stents. DESIGN All patients with benig...

2013
Deepak Singh

ABSTARCT: Flow measurement plays vital role in Air conditioning leak detection to measure leakages of conditioned air in a airconditioning system of the building. It is costlier process to convert properties of air into making of desired atmosphere of the building. The leakage of conditioned air is cause of loss of money. In this stems the need for accurate, economical measurement for leakages ...

Journal: :IACR Cryptology ePrint Archive 2017
Yann Le Corre Johann Großschädl Daniel Dinu

Masking is a common technique to protect software implementations of symmetric cryptographic algorithms against Differential Power Analysis (DPA) attacks. The development of a properly masked version of a block cipher is an incremental and time-consuming process since each iteration of the development cycle involves a costly leakage assessment. To achieve a high level of DPA resistance, the arc...

2016
Wouter de Groot Kostas Papagiannopoulos Antonio de la Piedra Erik Schneider Lejla Batina

Software-based cryptographic implementations can be vulnerable to side-channel analysis. Masking countermeasures rank among the most prevalent techniques against it, ensuring formally the protection vs. value-based leakages. However, its applicability is halted by two factors. First, a masking countermeasure involves a computational overhead that can render implementations inefficient. Second, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید