نتایج جستجو برای: countermeasure

تعداد نتایج: 4411  

Journal: :Journal of the American Medical Informatics Association : JAMIA 2013
Mehmet Kuzu Murat Kantarcioglu Elizabeth Durham Csaba Tóth Bradley Malin

OBJECTIVE Integration of patients' records across resources enhances analytics. To address privacy concerns, emerging strategies such as Bloom filter encodings (BFEs), enable integration while obscuring identifiers. However, recent investigations demonstrate BFEs are, in theory, vulnerable to cryptanalysis when encoded identifiers are randomly selected from a public resource. This study investi...

2012
Jean-Luc Danger Sylvain Guilley Philippe Hoogvorst Cédric Murdica David Naccache

On smart-cards, Elliptic Curve Cryptosystems (ECC) can be vulnerable to Side Channel Attacks such as the Re ned Power Analysis (RPA). This attack takes advantage of the apparition of special points of the form (0, y). In this paper, we propose a new countermeasure based on co-Z formulæ and an extension of the curve isomorphism countermeasure. It permits to transform the base point P = (x, y) in...

2002
Li-Chiou Chen Kathleen M. Carley

How can virus countermeasures such as software patches or warnings be disseminated and installed more efficiently than they are currently so that fewer organizations will suffer virus infection problems? The relative effectiveness of four anti-virus strategies is examined formally using simulations. One of these strategies is the countermeasure spreading strategy (CMS). CMS is based on the idea...

Journal: :CoRR 2014
Marc Lichtman

This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigat...

2015
Kevin R. Duda Rebecca A. Vasquez Akil J. Middleton Mitchell L. Hansberry Dava J. Newman Shane E. Jacobs John J. West

The "Variable Vector Countermeasure Suit (V2Suit) for Space Habitation and Exploration" is a novel system concept that provides a platform for integrating sensors and actuators with daily astronaut intravehicular activities to improve health and performance, while reducing the mass and volume of the physiologic adaptation countermeasure systems, as well as the required exercise time during long...

Journal: :Psychophysiology 2004
J Peter Rosenfeld Matthew Soskins Gregory Bosh Andrew Ryan

We found countermeasures to protocols using P300 in concealed information tests. One, the "six-probe" protocol, in Experiment 1, uses six different crime details in one run. The countermeasure: generate covert responses to irrelevant stimuli for each probe category. Hit rates were 82% in the guilty group; 18% in the countermeasure group. The average reaction time (RT) distinguished these two gr...

Journal: :IACR Cryptology ePrint Archive 2016
Peter Pessl

Implementation security for lattice-based cryptography is still a vastly unexplored field. At CHES 2016, the very first side-channel attack on a lattice-based signature scheme was presented. Later, shuffling was proposed as an inexpensive means to protect the Gaussian sampling component against such attacks. However, the concrete effectiveness of this countermeasure has never been evaluated. We...

Journal: :Journal of musculoskeletal & neuronal interactions 2009
D L Belavý T Miokovic G Armbrecht J Rittweger D Felsenberg

OBJECTIVES The current study aimed to examine the effectiveness of a resistive vibration exercise countermeasure during prolonged bed-rest in preventing lower-limb muscle atrophy. METHODS 20 male subjects underwent 56-days of bed-rest and were assigned to either an inactive control, or a countermeasure group which performed high-load resistive exercises (including squats, heel raises and toe ...

2008
Jean-Sébastien Coron

We propose and analyse a new countermeasure against Differential Power Analysis (DPA) for the AES encryption algorithm, based on permutation tables. As opposed to existing AES countermeasures, it does not use random masking. We prove that our new countermeasure is resistant against first-order DPA; we also show that it is quite efficient in practice.

2008
Vi Pham Zachary Taylor

In this report, we investigate the possibility of production of a novel new anthrax treatment with minimal side effects and virtually no possibility of bacterial resistance. The pharmaceutical is based on the innovative combination of two recently discovered components: an agent that aids the immune system in defeating an anthrax infection and the “bait” by which to attack the anthrax in vivo. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید