نتایج جستجو برای: fatigue countermeasure

تعداد نتایج: 74370  

2002
Kouichi Itoh Jun Yajima Masahiko Takenaka Naoya Torii

We propose three differential power analysis (DPA) countermeasures for securing the public key cryptosystems. All countermeasures are based on the window method, and can be used in both RSA and elliptic curve cryptosystems (ECC). By using the optimal countermeasure, performance penalty is small. In comparison with k-ary method, computation time of our countermeasure is only 105% in 1024-bit RSA...

Journal: :Injury prevention : journal of the International Society for Child and Adolescent Injury Prevention 1996
W Foege

ment in parent supervision. Other postmarketing surveillance requirements include the monitoring ofthe durability of the product and determining whether the countermeasure has been applied as intended (for example bicycle helmet fit).5 What's needed is a systematic approach to injury countermeasure postmarketing surveillance. Only then will the full value of the countermeasure for the world com...

2007
HeeSeok Kim Tae Hyun Kim Jeong Choon Ryoo Dong-Guk Han Howon Kim Jongin Lim

In cryptographic devices like a smart card whose computing ability and memory are limited, cryptographic algorithms should be performed efficiently. However, the issue of efficiency sometimes raises vulnerabilities against side channel attacks (SCAs). In elliptic curve cryptosystems, one of main operations is the scalar multiplication. Thus it must be constructed in safety against SCAs. Recentl...

Journal: :IEICE Transactions 2010
So Ryoung Park Sanguk Noh

This paper investigates the autonomous decision-making process of the selection of alternative countermeasures against threats in electronic warfare settings. We introduce a threat model, which represents a specific threat pattern, and a methodology that decides the best countermeasure against real-time threats using the decision theory. To determine the optimal countermeasure, we model the pro...

2013
Federico Alegre Ravichander Vipperla Asmaa Amehraye Nicholas W. D. Evans

This paper presents a new countermeasure for the protection of automatic speaker verification systems from spoofed, converted voice signals. The new countermeasure is based on the analysis of a sequence of acoustic feature vectors using Local Binary Patterns (LBPs). Compared to existing approaches the new countermeasure is less reliant on prior knowledge and affords robust protection from not o...

1998
James Lacombe

Simple countermeasures against passive (thermal) infrared intrusion detection systems (IDSs) and thermal imagers were tested in winter by U.S. Army Special Forces soldiers working with personnel of the U. S. Army Cold Regions Research and Engineering Laboratory (CRREL). Under certain site conditions, the countermeasures were very effective, enabling intruders to pass undetected by the infrared ...

2008
Toru Akishita Masanobu Katagi Yoshikazu Miyato Asami Mizuno Kyoji Shibutani

We propose a logic-level DPA countermeasure called Dualrail Pre-charge circuit with Binary Decision Diagram architecture (DPBDD). The proposed countermeasure has a dual-rail pre-charge logic style and can be implemented using CMOS standard cell libraries, which is the similar property to Wave Dynamic Differential Logic (WDDL). By using novel approaches, we can successfully reduce the early prop...

1996
D. B. Pape V. K. Narendran

An important part of ITS (Intelligent Transportation Systems, formerly IVHS) is the development of collision avoidance systems. These systems continuously sense the dynamic state of the vehicle and the roadway situation, and they assess the potential for a collision. When the system determines that an emergency situation might be developing, it wams the driver to take evasive action. Such count...

2010
Willem De Groef Nick Nikiforakis Yves Younan Frank Piessens F. Piessens

In order to combat code injection attacks, modern operating systems use among others, the Write-XOR-Execute (W⊕X) countermeasure which disallows code execution from writable memory pages. Unfortunately though, a widely used programming technique, namely Just-in-time compilation (JIT), clashes with the use of this countermeasure since its use relies on writable memory where it places dynamically...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید