نتایج جستجو برای: countermeasure
تعداد نتایج: 4411 فیلتر نتایج به سال:
Cephalad redistribution of intravascular and extravascular fluid occurs as a result of weightlessness during spaceflight. This provokes cardiovascular, cardiopulmonary, and autonomic nervous system responses. The resulting altered functional state can result in orthostatic hypotension and intolerance upon landing and return to a gravity environment. In-flight lower body negative pressure (LBNP)...
"Fixed fortifications are monuments to the stupidity of man" General George Patton, Jr. Solutions to the Byzantine General Problem are applied to the design of an Intrusion Detection & Countermeasure Systems, called SAFE, being developed at the Worcester Polytechnic Institute System Security Research Laboratory (WSSRL). As described in this paper, Byzantine Agreement Protocols (BAP) arrived at ...
Third Order Differential Analysis and A Split Mask Countermeasure For Low Energy Embedded Processors
Future wireless embedded devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although many embedded devices offer more resistance to bus probing attacks due to their compact size, susceptibility to power or electromagnetic analysis attacks must be analyzed. This paper presents a new split mask countermeasure to thwart low order di...
This paper presents a mechanism for detecting and containing fast scanning computer network worms. The countermeasure mechanism, termed NEDAC, uses a behavioural detection technique that observes the absence of DNS resolution in newly initiated outgoing connections. Upon detection of abnormal behaviour by a host, based on the absence of DNS resolution, the detection system then invokes a data l...
In the last decade, an effort has been made by the research community to find efficient ways to thwart side channel analysis (SCA) against physical implementations of cryptographic algorithms. A common countermeasure for implementations of block ciphers is Boolean masking which randomizes by the bitwise addition of one or several random value(s) to the variables to be protected. However, advanc...
Random delays and dynamic frequency switching are widely adopted in smartcards and embedded systems as temporal hiding countermeasures to side channel attack.Temporal hiding is regarded as efficient to enhance the security of cryptographic devices. However, spectral analysis with Fast Fourier Transform is a powerful method to defeat temporal hiding countermeasures. Spectral analysis shares the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید