نتایج جستجو برای: tamper shape
تعداد نتایج: 192340 فیلتر نتایج به سال:
Three-dimensional (3D) model, including 3D geometric CAD model, has come to be recognized as a “multimedia” data type, along with such data types as sound, text, still image, and movie. As a data type, each one of these data types has a set of operations associated with it. Representative of operations are input, output, editing, indexing, hyper-linking, compression, similarity-based search, an...
Recent industrial efforts in architectural and system support for trusted computing still leave systems wide-open even to relatively simple and inexpensive hardware-based attacks. These attacks attempt to snoop or modify data transfer between various chips in a computer system such as between the processor and memory, and between processors in a multiprocessor interconnect network. Software sec...
Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that the tampered device will reveal secret information. Inspired by the work of Ishai et al. [Eurocrypt’06], we propose a compiler that transforms any circuit into a new circuit with the same functionality, but which is resilient ...
a non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. the main idea behind nonmalleable coding is that the adversary should not be able to obtain any valuable information about the message. non-malleablecodes are used in tamper-resilient cryptography and protecting memories against tampering attacks. many different types of nonmalleability have already...
چکیده: مقدمه و هدف: آگاهی از آناتومی کانال خصوصاً در آناتومی های پیچیده مثل کانال های c-shape برای انجام یک درمان موفق ضروری می باشد. از آنجا که در کانال های c-shape نحوه ارتباط از کرونال تا آپیکال در نحوه درمان انجام شده مهم است تشخیص وضعیت آناتومیک این کانال ها می تواند اهمیت زیادی داشته باشد. در این مطالعه، مقایسه ای بین پنج روش مختلف برای تشخیص آناتومی c-shape انجام گرفته تا روشی دقیق برای...
Cryptographic assumptions regarding tamper-proof hardware tokens have gained increasing attention. Even if the tamper-proof hardware is issued by one of the parties, and hence not necessarily trusted by the other, many tasks become possible: Tamper proof hardware is sufficient for universally composable protocols, for information-theoretically secure protocols, and even can be used to create so...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید