نتایج جستجو برای: profiled

تعداد نتایج: 3754  

Journal: :IACR Cryptology ePrint Archive 2012
Nicolas Debande Maël Berthier Yves Bocktaels Thanh-Ha Le

An embedded cryptographic device performs operation on sensitive data and as such, is vulnerable to side-channel attacks. This forces smart-card manufacturers to carefully consider development of security mechanisms. To accelerate this procedure, the use of power and electromagnetic simulator can be relevant and saves non negligible time. Based on a high level simulator, we propose to use profi...

2010
KELLY J. BENOIT-BIRD MARK A. MOLINE IAN C. ROBBINS CHAD M. WALUK

KELLY J. BENOIT-BIRD 1*, MARK A. MOLINE 2, OSCAR M. SCHOFIELD 3, IAN C. ROBBINS 2 AND CHAD M. WALUK 1 1 COLLEGE OF OCEANIC AND ATMOSPHERIC SCIENCES, OREGON STATE UNIVERSITY, 104 COAS ADMINISTRATION BUILDING, CORVALLIS, OR 97331, USA, 2 BIOLOGICAL SCIENCES DEPARTMENT, CENTER FOR MARINE AND COASTAL SCIENCES, CALIFORNIA POLYTECHNIC STATE UNIVERSITY, SAN LUIS OBISPO, CA 93407, USA AND 3 INSTITUTE O...

1998
Jin Soung Yoo Pusheng Zhang Shashi Shekhar

A time-profiled association is an association pattern consistent with a query sequence along time, e.g., identifying interacting relationship of droughts and wild fires in Australia with the El Nino phenomenon in the past 50 years. Association patterns by traditional association rule mining approaches reveal the generic dependency among variables, however, the evolution of these patterns along ...

Journal: :IACR Cryptology ePrint Archive 2017
Stjepan Picek Annelie Heuser Alan Jovic Axel Legay Karlo Knezevic

Profiled side-channel attacks represent the most powerful category of side-channel attacks. In this context, the attacker gains access of a profiling device to build a precise model which is used to attack another device in the attacking phase. Mostly, it is assumed that the attacker has unlimited capabilities in the profiling phase, whereas the attacking phase is very restricted. We step away ...

Journal: :Wireless Communications and Mobile Computing 2002
Muhammad Jaseemuddin Junaid Ahmed Zubairi Omer Mahmoud

There is a growing interest in providing Internet services to the mobile nodes. When mobile nodes travel from one router's service area to another, the time-sensitive applications may see degradation in service. We investigate into the effects of handoff on service quality of mobile nodes. Several experiments are conducted using various packet-metering schemes with or without transferring profi...

Journal: :IACR Cryptology ePrint Archive 2014
Marios O. Choudary Markus G. Kuhn

Template attacks and stochastic models are among the most powerful side-channel attacks. However, they can be computationally expensive when processing a large number of samples. Various compression techniques have been used very successfully to reduce the data dimensionality prior to applying template attacks, most notably Principal Component Analysis (PCA) and Fisher’s Linear Discriminant Ana...

Journal: :IJWIN 2003
Satya Kovvuri Vijoy Pandey Dipak Ghosal Biswanath Mukherjee Dilip Sarkar

Future broadband wireless access systems are expected to integrate various classes of mobile terminals (MTs), each class with a different type of quality of service (QoS) requirement. When the load on a wireless network is high, the guarantee of QoS for each class of MTs is a challenging task. This study considers two classes of MTs—profiled MTs and nonprofiled or regular MTs. It is assumed tha...

Journal: :Journal of the Korean Society of Tribologists and Lubrication Engineers 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید