نتایج جستجو برای: dental leakages

تعداد نتایج: 162691  

2012
Amir Moradi

By examining the similarity of side-channel leakages, collision attacks evade the indispensable hypothetical leakage models of multi-query based side-channel distinguishers like correlation power analysis and mutual information analysis attacks. Most of the side-channel collision attacks compare two selective observations, what makes them similar to simple power analysis attacks. A multi-query ...

2015
Ying-Chiang Cho Jen-Yi Pan

Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people's lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. The most serious problems concerning web vulnerability are e-mail addr...

Journal: :IOP Conference Series: Materials Science and Engineering 2021

Journal: :IEEE Transactions on Dependable and Secure Computing 2022

To achieve efficiently search and update on outsourced encrypted data, dynamic searchable symmetric encryption (DSSE) was proposed by just leaking some well-defined leakages. Though small, many recent works show that an attacker can exploit these leakages to undermine the security of existing DSSE schemes. In particular, even seemingly harmless size pattern perform severe attacks. Many exiting ...

Journal: :International Journal of Computer Applications 2016

Journal: :Renewable Energy 2022

The water distribution network (WDN) is subject to leakages due pipes breaking, which induces a wastage of and overconsumption power for pumps. Leakages are directly related pressure in the pipes. To reduce leakages, reducing valves (PRV) installed networks However, reduction loss energy wasted within PRV. recover part this energy, can be replaced by using pumps as turbines (PATs). Since head f...

Journal: :IACR Cryptology ePrint Archive 2013
Yuchen Cao Yongbin Zhou Zhenmei Yu

Side-channel information leaked during the execution of cryptographic modules usually contains various noises. Normally, these noises have negative effects on the performance of side-channel attacks exploiting noisy leakages. Therefore, to reduce noise in leakages usually serves to be an effective approach to enhance the performance of side-channel attacks. However, most existing noise reductio...

Journal: :Digestive surgery 2014
Marc Schiesser Patricia Kressig Marco Bueter Antonio Nocito Peter Bauerfeind Christoph Gubler

BACKGROUND Management of leakages of the gastrojejunal anastomosis after laparoscopic Roux-en-Y gastric bypass (LRYGB) can be complex. New endoscopic techniques such as covered stents and over-the-scope clips (OTCs) have been developed and are valuable alternative therapeutic options to reoperation and drainage. The aim of this study was to compare the value of stents and OTCs with surgical tre...

2017
Júlio Cezar Uili COELHO Lucas de Oliveira LEITE Antonio MOLENA Alexandre Coutinho Teixeira de FREITAS Jorge Eduardo Fouto MATIAS

BACKGROUND Biliary reconstitution has been considered the Achilles's heel of liver transplantations due to its high rate of postoperative complications. AIM To evaluate the risk factors for occurrence of biliary strictures and leakages, and the most efficient methods for their treatment. METHOD Of 310 patients who underwent liver transplantation between 2001 and 2015, 182 medical records we...

Journal: :IACR Cryptology ePrint Archive 2017
Thorben Moos Amir Moradi

Applying random and uniform masks to the processed intermediate values of cryptographic algorithms is arguably the most common countermeasure to thwart side-channel analysis attacks. So-called masking schemes exist in various shapes but are mostly used to prevent side-channel leakages up to a certain statistical order. Thus, to learn any information about the key-involving computations a side-c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید