نتایج جستجو برای: profiled
تعداد نتایج: 3754 فیلتر نتایج به سال:
An embedded cryptographic device performs operation on sensitive data and as such, is vulnerable to side-channel attacks. This forces smart-card manufacturers to carefully consider development of security mechanisms. To accelerate this procedure, the use of power and electromagnetic simulator can be relevant and saves non negligible time. Based on a high level simulator, we propose to use profi...
KELLY J. BENOIT-BIRD 1*, MARK A. MOLINE 2, OSCAR M. SCHOFIELD 3, IAN C. ROBBINS 2 AND CHAD M. WALUK 1 1 COLLEGE OF OCEANIC AND ATMOSPHERIC SCIENCES, OREGON STATE UNIVERSITY, 104 COAS ADMINISTRATION BUILDING, CORVALLIS, OR 97331, USA, 2 BIOLOGICAL SCIENCES DEPARTMENT, CENTER FOR MARINE AND COASTAL SCIENCES, CALIFORNIA POLYTECHNIC STATE UNIVERSITY, SAN LUIS OBISPO, CA 93407, USA AND 3 INSTITUTE O...
A time-profiled association is an association pattern consistent with a query sequence along time, e.g., identifying interacting relationship of droughts and wild fires in Australia with the El Nino phenomenon in the past 50 years. Association patterns by traditional association rule mining approaches reveal the generic dependency among variables, however, the evolution of these patterns along ...
Profiled side-channel attacks represent the most powerful category of side-channel attacks. In this context, the attacker gains access of a profiling device to build a precise model which is used to attack another device in the attacking phase. Mostly, it is assumed that the attacker has unlimited capabilities in the profiling phase, whereas the attacking phase is very restricted. We step away ...
There is a growing interest in providing Internet services to the mobile nodes. When mobile nodes travel from one router's service area to another, the time-sensitive applications may see degradation in service. We investigate into the effects of handoff on service quality of mobile nodes. Several experiments are conducted using various packet-metering schemes with or without transferring profi...
Template attacks and stochastic models are among the most powerful side-channel attacks. However, they can be computationally expensive when processing a large number of samples. Various compression techniques have been used very successfully to reduce the data dimensionality prior to applying template attacks, most notably Principal Component Analysis (PCA) and Fisher’s Linear Discriminant Ana...
Future broadband wireless access systems are expected to integrate various classes of mobile terminals (MTs), each class with a different type of quality of service (QoS) requirement. When the load on a wireless network is high, the guarantee of QoS for each class of MTs is a challenging task. This study considers two classes of MTs—profiled MTs and nonprofiled or regular MTs. It is assumed tha...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید