نتایج جستجو برای: dental leakages
تعداد نتایج: 162691 فیلتر نتایج به سال:
By examining the similarity of side-channel leakages, collision attacks evade the indispensable hypothetical leakage models of multi-query based side-channel distinguishers like correlation power analysis and mutual information analysis attacks. Most of the side-channel collision attacks compare two selective observations, what makes them similar to simple power analysis attacks. A multi-query ...
Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people's lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. The most serious problems concerning web vulnerability are e-mail addr...
To achieve efficiently search and update on outsourced encrypted data, dynamic searchable symmetric encryption (DSSE) was proposed by just leaking some well-defined leakages. Though small, many recent works show that an attacker can exploit these leakages to undermine the security of existing DSSE schemes. In particular, even seemingly harmless size pattern perform severe attacks. Many exiting ...
The water distribution network (WDN) is subject to leakages due pipes breaking, which induces a wastage of and overconsumption power for pumps. Leakages are directly related pressure in the pipes. To reduce leakages, reducing valves (PRV) installed networks However, reduction loss energy wasted within PRV. recover part this energy, can be replaced by using pumps as turbines (PATs). Since head f...
Side-channel information leaked during the execution of cryptographic modules usually contains various noises. Normally, these noises have negative effects on the performance of side-channel attacks exploiting noisy leakages. Therefore, to reduce noise in leakages usually serves to be an effective approach to enhance the performance of side-channel attacks. However, most existing noise reductio...
BACKGROUND Management of leakages of the gastrojejunal anastomosis after laparoscopic Roux-en-Y gastric bypass (LRYGB) can be complex. New endoscopic techniques such as covered stents and over-the-scope clips (OTCs) have been developed and are valuable alternative therapeutic options to reoperation and drainage. The aim of this study was to compare the value of stents and OTCs with surgical tre...
BACKGROUND Biliary reconstitution has been considered the Achilles's heel of liver transplantations due to its high rate of postoperative complications. AIM To evaluate the risk factors for occurrence of biliary strictures and leakages, and the most efficient methods for their treatment. METHOD Of 310 patients who underwent liver transplantation between 2001 and 2015, 182 medical records we...
Applying random and uniform masks to the processed intermediate values of cryptographic algorithms is arguably the most common countermeasure to thwart side-channel analysis attacks. So-called masking schemes exist in various shapes but are mostly used to prevent side-channel leakages up to a certain statistical order. Thus, to learn any information about the key-involving computations a side-c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید