نتایج جستجو برای: dental leakages
تعداد نتایج: 162691 فیلتر نتایج به سال:
introduction: in recent years, significant developments have been taking place in caries removal and cavity preparation using laser in dentistry. as laser use is considered for cavity preparation, it is necessary to determine the quality of restoration margins. glass ionomer cements have great applications for conservative restoration in the pediatric field. the purpose of this in vitro study w...
Reducing the entropy of the mask is a technique which has been proposed to mitigate the high performance overhead of masked software implementations of symmetric block ciphers. Rotating S-box Masking (RSM) is an example of such schemes applied to AES with the purpose of maintaining the security at least against univariate first-order side-channel attacks. This article examines the vulnerability...
The cost effective maintenance of underwater pressure pipes for sewage disposal in Austria requires the detection and localization of leakages. Extrusion of wastewater in lakes can heavily influence the water and bathing quality of surrounding waters. The Distributed Temperature Sensing (DTS) technology is a widely used technique for oil and gas pipeline leakage detection. While in pipeline lea...
Yoneyama et al. introduced Leaky Random Oracle Model (LROM for short) at ProvSec2008 in order to discuss security (or insecurity) of cryptographic schemes which use hash functions as building blocks when leakages from pairs of input and output of hash functions occur. This kind of leakages occurs due to various attacks caused by sloppy usage or implementation. Their results showed that this kin...
In CHES 2008 a generic side-channel distinguisher, Mutual Information, has been introduced to be independent of the relation between measurements and leakages as well as between leakages and data processed. Assuming a Gaussian model for the side-channel leakages, correlation power analysis (CPA) is capable of revealing the secrets efficiently. The goal of this paper is to compare mutual informa...
The detection and handling of data leakages is becoming a critical issue for organizations. To this end, data leakage solutions are usually employed by organizations to monitor network traffic and the use of portable storage devices. These solutions often produce a large number of alerts, whose analysis is timeconsuming and costly for organizations. To effectively handle leakage incidents, orga...
As the new SHA-3 standard, the security and reliability of Keccak have attracted a lot of attentions. Previous works already show that both software and hardware implementations of Keccak have strong side-channel power (electromagnetic) leakages, and these leakages can be easily used by attackers to recover secret key bits. Meanwhile, Keccak is vulnerable to random errors and injected faults, w...
OBJECTIVE To describe a new intraoperative bile leakage test in patients undergoing a major liver resection aimed to combine the advantages of each of the other standard bile leakage tests (accurate visualization of leaks, reproducibility, and ease of use) without their disadvantages. METHODS At the end of the major hepatic resection, 10 to 30 mL of sterile fat emulsion, 5%, is injected via a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید