نتایج جستجو برای: countermeasure
تعداد نتایج: 4411 فیلتر نتایج به سال:
the effect of a combined system of the bed suction and jet injection as a pier-scour countermeasure on the turbulent flow field is studied in a laboratory flume using an acoustic doppler velocimeter (adv). the three components of the velocities in the vertical symmetry plane in the equilibrium scour hole in front and rear of the pier under 3-jet injections and bed suction rate qs/q0 = 2%located...
Most side channel countermeasures for software implementations of cryptography either rely on masking or randomize the execution order of the cryptographic implementation. This work proposes a countermeasure that has constant leakage in common linear leakage models. Constant leakage is achieved not only for internal state values, but also for their transitions. The proposed countermeasure provi...
We propose three differential power analysis (DPA) countermeasures for securing the public key cryptosystems. All countermeasures are based on the window method, and can be used in both RSA and elliptic curve cryptosystems (ECC). By using the optimal countermeasure, performance penalty is small. In comparison with k-ary method, computation time of our countermeasure is only 105% in 1024-bit RSA...
ment in parent supervision. Other postmarketing surveillance requirements include the monitoring ofthe durability of the product and determining whether the countermeasure has been applied as intended (for example bicycle helmet fit).5 What's needed is a systematic approach to injury countermeasure postmarketing surveillance. Only then will the full value of the countermeasure for the world com...
In cryptographic devices like a smart card whose computing ability and memory are limited, cryptographic algorithms should be performed efficiently. However, the issue of efficiency sometimes raises vulnerabilities against side channel attacks (SCAs). In elliptic curve cryptosystems, one of main operations is the scalar multiplication. Thus it must be constructed in safety against SCAs. Recentl...
This paper investigates the autonomous decision-making process of the selection of alternative countermeasures against threats in electronic warfare settings. We introduce a threat model, which represents a specific threat pattern, and a methodology that decides the best countermeasure against real-time threats using the decision theory. To determine the optimal countermeasure, we model the pro...
This paper presents a new countermeasure for the protection of automatic speaker verification systems from spoofed, converted voice signals. The new countermeasure is based on the analysis of a sequence of acoustic feature vectors using Local Binary Patterns (LBPs). Compared to existing approaches the new countermeasure is less reliant on prior knowledge and affords robust protection from not o...
Simple countermeasures against passive (thermal) infrared intrusion detection systems (IDSs) and thermal imagers were tested in winter by U.S. Army Special Forces soldiers working with personnel of the U. S. Army Cold Regions Research and Engineering Laboratory (CRREL). Under certain site conditions, the countermeasures were very effective, enabling intruders to pass undetected by the infrared ...
We propose a logic-level DPA countermeasure called Dualrail Pre-charge circuit with Binary Decision Diagram architecture (DPBDD). The proposed countermeasure has a dual-rail pre-charge logic style and can be implemented using CMOS standard cell libraries, which is the similar property to Wave Dynamic Differential Logic (WDDL). By using novel approaches, we can successfully reduce the early prop...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید