Filters








46,149 Hits in 2.4 sec

Global Geography

Howard Becker, George T. Renner
1945 American Sociological Review  
Howarp BECKER University of Wisconsin This Day’s Madness. By MERCEDES ROSEBERRY. New York: Macmillian Co., 1944. Pp. 175. $2.00.  ...  By Georce T. RENNER and Associates. New York: Thomas Y. Crowell Co., 1944. Pp. vili + 728. $3.75.  ... 
doi:10.2307/2086130 fatcat:765czctnirc35n5piaiumlt2hq

Peter Emil Becker, Sozialdarwinismus, Rassismus, Antisemitismus und Völkischer Gedanke: Wege ins Dritte Reich, Teil II. Stuttgar t, New York, Georg Thieme Verlag, 1990. X, 644 S. Portr. DM148,-. ISBN 3-13736901-0

Jean Lindenmann
1992 Gesnerus  
Albert Schänzel Georg Thieme Verlag, 1990. X, 644 S. Portr. DM148,-.  ...  Becker das Gebiet der populärwissenschaftlich ausstrahlenden Rassisten, Sozialdarwinisten und «völkischen» Schwarmgeister.  ... 
doi:10.1163/22977953-04901026 fatcat:cabw6tbrbzcyvfe5gcxypkftry

Stealthy Dopant-Level Hardware Trojans [chapter]

Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson
2013 Lecture Notes in Computer Science  
08/22/2013 Georg T. Becker 18 Remaining question: 08/22/2013  Conclusion & future work 08/22/2013 Georg T. Becker Georg T.  ...  08/22/2013 Georg T. Becker 12 08/22/2013 A Y A Y VDD GND VDD GND Georg T.  ... 
doi:10.1007/978-3-642-40349-1_12 fatcat:rix3aezgzvhj3isg6zyzqbkh64

Secure Location Verification [chapter]

Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar
2010 Lecture Notes in Computer Science  
In secure location self-verification for A, A can be sure that A was at location L A at time t.  ...  yet, we start this paper with a definition of location verification and location self-verification: In secure location verification from A to B, B can be sure that entity A was at location L A at time t.  ... 
doi:10.1007/978-3-642-13739-6_29 fatcat:senid6uuprbqzbnr53qzfz74fe

Stealthy dopant-level hardware Trojans: extended version

Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson
2014 Journal of Cryptographic Engineering  
K = K ⊕ x 5. c = c ⊕ y Whenever the conditioner has a new seed, consisting of the 128-bit values s and t, available the internal states c and K are reseeded using the (c,K)=Reseed(s,t,c,K) function: 1.  ...  K = K ⊕ x ⊕ s, 4. c = c ⊕ y ⊕ t Under low load, the rate matcher reseeds after each output of r.  ... 
doi:10.1007/s13389-013-0068-0 fatcat:xvxc7ultzjgtdctvet7szsw4eu

dPHI: An improved high-speed network-layer anonymity protocol

Alexander Bajic, Georg T. Becker
2020 Proceedings on Privacy Enhancing Technologies  
The output is a triplet consisting of a freshly generated IV IV , authentication tag t and the corresponding cyphertext c with (c, t, IV ) = enc k (p, a).  ...  Equation 5 shows how a routing element consisting of (c i , t i , IV i ) is computed: (c i , t i , IV i ) = enc ki (R; sid||c pos−1 ) R = (ingress||egress||type||posV 1||posV 2) (5) See Algorithms 1 and  ... 
doi:10.2478/popets-2020-0054 fatcat:qeqcgfhyyfeqpctr6ny3ua6gpa

Side channels as building blocks

Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Christof Paar, Wayne Burleson
2012 Journal of Cryptographic Engineering  
t) · (c i −c) (∑ n i=1 (t i −t) 2 )(∑ n i=1 (c i −c) 2 ) , where c i are the bits of the known code sequence (mapped to fit the power model of the leakage circuit), n is the length of the code sequence  ...  The demodulation can then be performed similar to a CPA: Given a set of measurement samples t i of a single power trace, the attacker estimates the Pearsons correlation coefficient as ρ = ∑ n i=1 (t i  ... 
doi:10.1007/s13389-012-0040-4 fatcat:2nk3ft3irze6tobihtry2uwkd4

Side-channel watermarks for embedded software

Georg T. Becker, Wayne Burleson, Christof Paar
2011 2011 IEEE 9th International New Circuits and systems conference  
In this paper we introduce a new software watermarking mechanism for the embedded environment. The newly proposed software watermarking mechanism can be added at the assembly level and hides the watermark in the power consumption of the device. By using side-channel analysis techniques, the verifier can reliably detect his watermark in the power traces of the device. This new approach is especially well suited for embedded microcontrollers that have program memory protection. In comparison to
more » ... her software watermark mechanisms a verifier does not need to have access to the software code or data memory to detect the watermark. This makes the detection of the watermarks very efficient for embedded applications in which access to the program code or data memory is very restricted. Our watermark method can therefore serve as a very easy and cost efficient way to detect software theft for embedded applications.
doi:10.1109/newcas.2011.5981323 fatcat:sgelnx6745gnrpf43jwfgsaeie

The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs [chapter]

Georg T. Becker
2015 Lecture Notes in Computer Science  
Becker et al. extended the idea of using unreliability and proposed a fault attack that is based on machine learning [3] .  ...  Φ i | > 0, if | w T Φ i | < (6) In the next step the attacker checks how well the hypothetical reliability vector h =h 1 , ..  ... 
doi:10.1007/978-3-662-48324-4_27 fatcat:55nibzb7bbh6ljxp5yjnnrskoi

Lifetime imaging with the Zeiss LSM-510

Wolfgang Becker, Axel Bergmann, Georg Weiss, Ammasi Periasamy, Peter T. C. So
2002 Multiphoton Microscopy in the Biomedical Sciences II  
The Zeiss LSM-510 NLO laser scanning microscope can be combined with a new TCSPC (time-correlated single photon counting) lifetime imaging technique developed by Becker & Hickl, Berlin.  ...  For each photon, it determines the detection time, t, referred to the next laser pulse [10] .  ...  Depending in the required resolution we use either a PMH-100 detector head of Becker & Hickl or an R3809U MCP-PMT of Hamamatsu.  ... 
doi:10.1117/12.470706 fatcat:zok2cqftvvaornf3hxz3jaeiim

Combining Optimization Objectives: New Modeling Attacks on Strong PUFs

Johannes Tobisch, Anita Aghaie, Georg T. Becker
2021 Transactions on Cryptographic Hardware and Embedded Systems  
The attack as proposed by Becker [Bec15] requires two measures of reliability, one for queried PUF responses and one for the model predictions.  ...  Gradient-based Reliability Attacks with Constraints In Section 2.3.2, we briefly summarized the reliability attack as presented by Becker [Bec15] .  ... 
doi:10.46586/tches.v2021.i2.357-389 fatcat:nrdphniczresbcm7idk7gvprma

Automated benchmark network diversification for realistic attack simulation with application to moving target defense

Alexander Bajic, Georg T. Becker
2021 International Journal of Information Security  
This, in turn, is not only B Alexander Bajic alexander.bajic@fu-berlin.de Georg T.  ...  Becker georg.becker@ruhr-uni-bochum.de 1 Digital Society Institute, ESMT Berlin, Berlin, Germany 2 DCSO, Berlin, Germany time-consuming and thus costly, but also risky as it increases chances of being  ... 
doi:10.1007/s10207-021-00552-9 fatcat:3uhd4yd5ejfcdpflyc7apyasay

Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs

Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar
2018 IEEE transactions on computers  
As an example, we can formT by •T [j] = 1, ∀j ∈ {0, ..., 31} •T [j] = T [j], ∀j ∈ {32, ..., 63}.  ...  Let LU T i be the i th occupied LUT of n available LUTs on the target FPGA. A LUT is a 64-bit truth table T that implements a Boolean function y = f (x) with x ∈ {0, 1} 6 and y ∈ {0, 1}.  ... 
doi:10.1109/tc.2016.2646367 fatcat:lrdaglhhqrdjvixmepkov7bum4

L'enseignement des lettres belges de langue française : où en est-on, où va-t-on ?

Anne-Marie Beckers, Christine Dela Rue, Bernard Delcord, Jean-Louis Dufays, Jacques Lefebvre, Georges Legros, Marc Quaghebeur, Jacques Vandenschrick
2001 Textyles  
Anne-Marie Beckers, Christine Dela Rue, Bernard Delcord, Jean-Louis Dufays, Jacques Lefebvre, Georges Legros, Marc Quaghebeur et Jacques Vandenschrick Plan Haut de page Texte intégral État des lieux 1  ...  119 Georges Legros — Deux choses.  ... 
doi:10.4000/textyles.903 fatcat:vght7z2c3ngbnfyzfmmqexclt4

T cells limit accumulation of aggregate pathology following intrastriatal injection of α-synuclein fibrils [article]

Sonia George, Trevor Tyson, Nolwen Lydianne Rey, Rachael Sheridan, Wouter Peerlaerts, Katelyn Becker, Emily Schulz, Lindsay Meyerdirk, Amanda Burmeister, Jennifer Steiner, Martha L. Escobar, Jiyan Ma (+2 others)
2020 bioRxiv   pre-print
T cells have been shown to recognize epitopes derived from α-syn and altered populations of T cells have been found in PD and MSA patients, providing evidence that these cells can be key to the pathogenesis  ...  Our work provides experimental evidence that T cells play a role in the pathogenesis of α-synucleinopathies.  ...  NSG mice did not contain T and B cell populations. Following adoptive transfer of T cells to NSG mice, CD45.2 + CD3 + T cells were detected.  ... 
doi:10.1101/2020.02.20.956599 fatcat:jmir2iituba25lerga243lzfbe
« Previous Showing results 1 — 15 out of 46,149 results