نتایج جستجو برای: fatigue countermeasure
تعداد نتایج: 74370 فیلتر نتایج به سال:
We propose three differential power analysis (DPA) countermeasures for securing the public key cryptosystems. All countermeasures are based on the window method, and can be used in both RSA and elliptic curve cryptosystems (ECC). By using the optimal countermeasure, performance penalty is small. In comparison with k-ary method, computation time of our countermeasure is only 105% in 1024-bit RSA...
ment in parent supervision. Other postmarketing surveillance requirements include the monitoring ofthe durability of the product and determining whether the countermeasure has been applied as intended (for example bicycle helmet fit).5 What's needed is a systematic approach to injury countermeasure postmarketing surveillance. Only then will the full value of the countermeasure for the world com...
In cryptographic devices like a smart card whose computing ability and memory are limited, cryptographic algorithms should be performed efficiently. However, the issue of efficiency sometimes raises vulnerabilities against side channel attacks (SCAs). In elliptic curve cryptosystems, one of main operations is the scalar multiplication. Thus it must be constructed in safety against SCAs. Recentl...
This paper investigates the autonomous decision-making process of the selection of alternative countermeasures against threats in electronic warfare settings. We introduce a threat model, which represents a specific threat pattern, and a methodology that decides the best countermeasure against real-time threats using the decision theory. To determine the optimal countermeasure, we model the pro...
This paper presents a new countermeasure for the protection of automatic speaker verification systems from spoofed, converted voice signals. The new countermeasure is based on the analysis of a sequence of acoustic feature vectors using Local Binary Patterns (LBPs). Compared to existing approaches the new countermeasure is less reliant on prior knowledge and affords robust protection from not o...
Simple countermeasures against passive (thermal) infrared intrusion detection systems (IDSs) and thermal imagers were tested in winter by U.S. Army Special Forces soldiers working with personnel of the U. S. Army Cold Regions Research and Engineering Laboratory (CRREL). Under certain site conditions, the countermeasures were very effective, enabling intruders to pass undetected by the infrared ...
We propose a logic-level DPA countermeasure called Dualrail Pre-charge circuit with Binary Decision Diagram architecture (DPBDD). The proposed countermeasure has a dual-rail pre-charge logic style and can be implemented using CMOS standard cell libraries, which is the similar property to Wave Dynamic Differential Logic (WDDL). By using novel approaches, we can successfully reduce the early prop...
An important part of ITS (Intelligent Transportation Systems, formerly IVHS) is the development of collision avoidance systems. These systems continuously sense the dynamic state of the vehicle and the roadway situation, and they assess the potential for a collision. When the system determines that an emergency situation might be developing, it wams the driver to take evasive action. Such count...
In order to combat code injection attacks, modern operating systems use among others, the Write-XOR-Execute (W⊕X) countermeasure which disallows code execution from writable memory pages. Unfortunately though, a widely used programming technique, namely Just-in-time compilation (JIT), clashes with the use of this countermeasure since its use relies on writable memory where it places dynamically...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید