نتایج جستجو برای: tamper shape

تعداد نتایج: 192340  

Journal: :IEICE Electronics Express 2008

2000
Ryutarou Ohbuchi Hiroshi Masuda

Three-dimensional (3D) model, including 3D geometric CAD model, has come to be recognized as a “multimedia” data type, along with such data types as sound, text, still image, and movie. As a data type, each one of these data types has a set of operations associated with it. Representative of operations are input, output, editing, indexing, hyper-linking, compression, similarity-based search, an...

2007
Yan Solihin

Recent industrial efforts in architectural and system support for trusted computing still leave systems wide-open even to relatively simple and inexpensive hardware-based attacks. These attacks attempt to snoop or modify data transfer between various chips in a computer system such as between the processor and memory, and between processors in a multiprocessor interconnect network. Software sec...

2011
Sebastian Faust Krzysztof Pietrzak Daniele Venturi

Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that the tampered device will reveal secret information. Inspired by the work of Ishai et al. [Eurocrypt’06], we propose a compiler that transforms any circuit into a new circuit with the same functionality, but which is resilient ...

Journal: :isecure, the isc international journal of information security 0
a. mortazavi sharif university of technology m. salmasizadeh sharif university of technology a. daneshgar sharif university of technology

a non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. the main idea behind nonmalleable coding is that the adversary should not be able to obtain any valuable information about the message. non-malleablecodes are used in tamper-resilient cryptography and protecting memories against tampering attacks. many different types of nonmalleability have already...

پایان نامه :وزارت بهداشت، درمان و آموزش پزشکی - دانشگاه علوم پزشکی و خدمات بهداشتی درمانی مشهد - دانشکده دندانپزشکی 1393

چکیده: مقدمه و هدف: آگاهی از آناتومی کانال خصوصاً در آناتومی های پیچیده مثل کانال های c-shape برای انجام یک درمان موفق ضروری می باشد. از آنجا که در کانال های c-shape نحوه ارتباط از کرونال تا آپیکال در نحوه درمان انجام شده مهم است تشخیص وضعیت آناتومیک این کانال ها می تواند اهمیت زیادی داشته باشد. در این مطالعه، مقایسه ای بین پنج روش مختلف برای تشخیص آناتومی c-shape انجام گرفته تا روشی دقیق برای...

Journal: :IACR Cryptology ePrint Archive 2012
Nico Döttling Daniel Kraschewski Jörn Müller-Quade

Cryptographic assumptions regarding tamper-proof hardware tokens have gained increasing attention. Even if the tamper-proof hardware is issued by one of the parties, and hence not necessarily trusted by the other, many tasks become possible: Tamper proof hardware is sufficient for universally composable protocols, for information-theoretically secure protocols, and even can be used to create so...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید