Filters








703 Hits in 9.0 sec

Joint Scheme for Physical Layer Error Correction and Security

Oluwayomi Adamo, M. R. Varanasi
2011 ISRN Communications and Networking  
We show the result of randomization test on ECBC and its security against conventional attacks.  ...  One of the challenges of using previous joint schemes in a communications channel is that there is a tradeoff between data reliability and security.  ...  The cipher is also based on the wide trail strategy. Their cipher is a six round block cipher that encrypts 256 bits of plaintext to a 512 bits ciphertext.  ... 
doi:10.5402/2011/502987 fatcat:kukwuqdt6fed3airelrpl7ib5y

Comparing the Cost of Protecting Selected Lightweight Block Ciphers against Differential Power Analysis in Low-Cost FPGAs

William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
2018 Computers  
Ongoing cryptographic contests and standardization efforts evaluate lightweight block ciphers on their resistance to power analysis side channel attack (SCA), and the ability to apply countermeasures.  ...  While some ciphers have been individually evaluated, a large-scale comparison of resistance to side channel attack and the formulation of absolute and relative costs of implementing countermeasures is  ...  before the first round), post-processing (computations executed after the last round), special rounds (for example, a reduced-functionality last round), and key scheduling (that is, calculation of round  ... 
doi:10.3390/computers7020028 fatcat:zdm7bm5pwvc6lotedvaldjrwby

Multitrophic interactions below and above ground: en route to the next level

Nicole M. van Dam, Martin Heil
2010 Journal of Ecology  
Dicke & T.  ...  On the one hand, the physiological integration of roots and shoots limits the spectrum of systemically induced responses that may occur.  ... 
doi:10.1111/j.1365-2745.2010.01761.x fatcat:dhoavleukvbvjf46bxhbaeg7nq

Fake BTS Attacks of GSM System on Software Radio Platform

Yubo Song, Kan Zhou, Xi Chen
2012 Journal of Networks  
The first paper, "Extensive Design for Attack's Recognition and Resistance of Survivable Network" by Hui Xu and Xiang Gu, gives a solution of attack defense of survivable network based on extentics.  ...  The extension model and algorithms of recognition and resistance of attacks is presented.  ...  In particular, we have Bel(  ) = 0 and Bel(Θ) = 1.  ... 
doi:10.4304/jnw.7.2.275-281 fatcat:3ejjimllcvewjeifopbvhl3zmi

When the Curious Abandon Honesty: Federated Learning Is Not Private [article]

Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot
2021 arXiv   pre-print
Our active attacker is able to recover user data perfectly and at near zero costs: the attack requires no complex optimization objectives.  ...  This is because prior efforts exclusively consider passive attackers that are honest-but-curious.  ...  on training an descent integrity.  ... 
arXiv:2112.02918v1 fatcat:oesbfzbu4bcyvhztkt7pcqq7vi

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs [article]

Kirill Nikitin, Ludovic Barman, Wouter Lueks, Matthew Underwood, Jean-Pierre Hubaux, Bryan Ford
2019 arXiv   pre-print
Second, we reserve the last t bytes of a PURB, where t is the size of the integrity tag defined in the cipher suite as a part of the AEAD scheme, as non-usable for public key XOR during decoding.  ...  Upon reception of the PURB, a decoder computes the potential public keys of interest, ignoring the last t bytes of the PURB, decrypts the payload and verifies the integrity using the unprocessed header  ... 
arXiv:1806.03160v4 fatcat:aesd5teyjrb2rbcoi4vnuui4ae

An Efficient and Reliable Chaos-Based IoT Security Core for UDP/IP Wireless Communication

Benkhaddra Ilyas, Senouci Mohammed Raouf, Senouci Abdelkader, Tanougast Camel, Sadoudi Said, Hang Lei
2022 IEEE Access  
First, a lightweight and energy-efficient hyperchaos-based encryption IP core is designed, implemented on an FPGA circuit and dedicated to IoT device security, denoted Hyperchaotic-based IoT Device Security  ...  Notably, the evaluations were conducted in two phases for all the platform components before and after integrating the proposed security core in real-time wireless communication.  ...  The absence of authentication and authorization standards for IoT devices fosters malicious attacks on quiet confidentiality attacks on network availability, such as denial-of-service (DoS) attacks [7  ... 
doi:10.1109/access.2022.3173338 fatcat:jqbe5ornabboznpwghnorqozyu

Embedded System Hardware [chapter]

Peter Marwedel
2021 Embedded Systems  
The need to cover other hardware components as well is a consequence of their impact on the performance, timing characteristics, power consumption, safety, and security.  ...  Overall, the idea behind this integration is to avoid extra chips for such functionality. As a result, a whole system is integrated on one chip.  ...  Attacks can be partitioned into the following [300]: • Software attacks are based on the execution of software. The deployment of software Trojans is an example of such an attack.  ... 
doi:10.1007/978-3-030-60910-8_3 fatcat:fqsp2laanfhp5le2d5q3pft2cu

The horns: symbol of power An iconographical study in Mesopotamian Art

Inass Mostafa Abd Elmohsen
2022 مجلة کلیة الآثار . جامعة القاهرة  
Human beard, ears, round bulges on his head.  ...  (Haller. 1954: abb161, p153) (fig .15) From Tell Asmar, a statue of the god of fertility appears on its rounded base.  ... 
doi:10.21608/jarch.2022.212070 fatcat:oh6kcutpt5egjn6inyexswc5xi

COVID-19 in New Orleans: A Nephrology Clinical and Education Perspective and Lessons Learned

Mihran Naljayan, Farshid Yazdi, Sarah Struthers, Moh'd Sharshir, Amanda Williamson, Eric E. Simon
2020 Kidney Medicine  
New Orleans' first case of COVID-19 was reported on March 9, 2020 with a subsequent rapid rise in the number of cases throughout the state of Louisiana.  ...  Traditional educational efforts were no longer viable with social distancing and stay-at-home orders, therefore virtual didactics were integrated into our curriculum.  ...  By the time Governor John Bel Edwards issued a statewide stay-at-home order on March 23, Louisiana had more than 1,000 confirmed cases of COVID-19, with one of the highest per capita infection rates in  ... 
doi:10.1016/j.xkme.2020.09.012 pmid:33283183 pmcid:PMC7708233 fatcat:sx2i7dkj2jc2hn5glhsw5jiwxq

Immunosuppressive therapy for kidney transplantation in adults: a systematic review and economic model

Tracey Jones-Hughes, Tristan Snowsill, Marcela Haasova, Helen Coelho, Louise Crathorne, Chris Cooper, Ruben Mujica-Mota, Jaime Peters, Jo Varley-Campbell, Nicola Huxley, Jason Moore, Matt Allwood (+5 others)
2016 Health Technology Assessment  
BEL + MMF appeared more effective than TAC + MMF and SRL + MMF at reducing mortality.  ...  SRL + AZA, TAC + AZA, TAC + MMF and BEL + MMF appeared to improve GRF compared with CSA + AZA and MMF + CSA.  ...  BEL also reduced the incidence of NODAT.  ... 
doi:10.3310/hta20620 pmid:27578428 fatcat:jienoy7sbzeq3my2j5sfjjep34

A methodology for studying persistency aspects of internet flows

Jörg Wallerich, Holger Dreger, Anja Feldmann, Balachander Krishnamurthy, Walter Willinger
2005 Computer communication review  
Pouzin who constructively commented on the fragmentation and accounting issues; and S. Crocker who commented on the creation and destruction of associations. Acknowledgments  ...  Acknowledgments We would like to thank AT&T Labs Research for providing access to Netflow data and Leibnitz Rechenzentrum, München for their help in collecting packet traces.  ...  In our tests, we set M T Uv to 256 bytes. 2.  ... 
doi:10.1145/1064413.1064417 fatcat:b5leqpkvmnd5paw2vws4mqhlme

Topic Compositional Neural Language Model [article]

Wenlin Wang, Zhe Gan, Wenqi Wang, Dinghan Shen, Jiaji Huang, Wei Ping, Sanjeev Satheesh, Lawrence Carin
2018 arXiv   pre-print
Further, our model yields sensible topics, and also has the capacity to generate meaningful sentences conditioned on given topics.  ...  Experimental results on several corpora show that the proposed approach outperforms both a pure RNN-based model and other topic-guided language models.  ...  Specifically, the T experts work together as follows: p(y m ) = softmax(Vh m ) (9) h m = σ(W(t)x m + U(t)h m−1 ) , (10) and W(t) = T k=1 t k • W[k], U(t) = T k=1 t k • U[k] . (11) In order to reduce the  ... 
arXiv:1712.09783v3 fatcat:4kglybxj7nafnauk3gp26uf5hu

Color Based Image Retrieval System

Pawandeep Kaur
2012 IOSR Journal of Computer Engineering  
In this work we mainly focused on color histogram-based method.  ...  The goal of CBIR system is to support image retrieval based on color. In a color based image retrieval system querying can be done by a query image.  ...  at time t.  ... 
doi:10.9790/0661-0150105 fatcat:lwr43nrwu5b6dap3lv5gkm5me4

New Products

1962 Science  
It flows through a 12-port manifold, containing the individual samples in their holders, and attacks hydrocarbons in them.  ...  The system consists of a lens that is focused on the subject, a fiber optic image converter, an analyzing aperture and a photocell.  ...  One master switch controls power on, refrigeration, vacuum, automatic acceleration, and coast and brake sequences. The electric brake reduces coast-down time by 50 percent.  ... 
doi:10.1126/science.138.3541.739 fatcat:snk3lb2cgnhl5lbxpyngbij3gm
« Previous Showing results 1 — 15 out of 703 results