A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Joint Scheme for Physical Layer Error Correction and Security
2011
ISRN Communications and Networking
We show the result of randomization test on ECBC and its security against conventional attacks. ...
One of the challenges of using previous joint schemes in a communications channel is that there is a tradeoff between data reliability and security. ...
The cipher is also based on the wide trail strategy. Their cipher is a six round block cipher that encrypts 256 bits of plaintext to a 512 bits ciphertext. ...
doi:10.5402/2011/502987
fatcat:kukwuqdt6fed3airelrpl7ib5y
Comparing the Cost of Protecting Selected Lightweight Block Ciphers against Differential Power Analysis in Low-Cost FPGAs
2018
Computers
Ongoing cryptographic contests and standardization efforts evaluate lightweight block ciphers on their resistance to power analysis side channel attack (SCA), and the ability to apply countermeasures. ...
While some ciphers have been individually evaluated, a large-scale comparison of resistance to side channel attack and the formulation of absolute and relative costs of implementing countermeasures is ...
before the first round), post-processing (computations executed after the last round), special rounds (for example, a reduced-functionality last round), and key scheduling (that is, calculation of round ...
doi:10.3390/computers7020028
fatcat:zdm7bm5pwvc6lotedvaldjrwby
Multitrophic interactions below and above ground: en route to the next level
2010
Journal of Ecology
Dicke & T. ...
On the one hand, the physiological integration of roots and shoots limits the spectrum of systemically induced responses that may occur. ...
doi:10.1111/j.1365-2745.2010.01761.x
fatcat:dhoavleukvbvjf46bxhbaeg7nq
Fake BTS Attacks of GSM System on Software Radio Platform
2012
Journal of Networks
The first paper, "Extensive Design for Attack's Recognition and Resistance of Survivable Network" by Hui Xu and Xiang Gu, gives a solution of attack defense of survivable network based on extentics. ...
The extension model and algorithms of recognition and resistance of attacks is presented. ...
In particular, we have Bel( ) = 0 and Bel(Θ) = 1. ...
doi:10.4304/jnw.7.2.275-281
fatcat:3ejjimllcvewjeifopbvhl3zmi
When the Curious Abandon Honesty: Federated Learning Is Not Private
[article]
2021
arXiv
pre-print
Our active attacker is able to recover user data perfectly and at near zero costs: the attack requires no complex optimization objectives. ...
This is because prior efforts exclusively consider passive attackers that are honest-but-curious. ...
on training an descent integrity. ...
arXiv:2112.02918v1
fatcat:oesbfzbu4bcyvhztkt7pcqq7vi
Reducing Metadata Leakage from Encrypted Files and Communication with PURBs
[article]
2019
arXiv
pre-print
Second, we reserve the last t bytes of a PURB, where t is the size of the integrity tag defined in the cipher suite as a part of the AEAD scheme, as non-usable for public key XOR during decoding. ...
Upon reception of the PURB, a decoder computes the potential public keys of interest, ignoring the last t bytes of the PURB, decrypts the payload and verifies the integrity using the unprocessed header ...
arXiv:1806.03160v4
fatcat:aesd5teyjrb2rbcoi4vnuui4ae
An Efficient and Reliable Chaos-Based IoT Security Core for UDP/IP Wireless Communication
2022
IEEE Access
First, a lightweight and energy-efficient hyperchaos-based encryption IP core is designed, implemented on an FPGA circuit and dedicated to IoT device security, denoted Hyperchaotic-based IoT Device Security ...
Notably, the evaluations were conducted in two phases for all the platform components before and after integrating the proposed security core in real-time wireless communication. ...
The absence of authentication and authorization standards for IoT devices fosters malicious attacks on quiet confidentiality attacks on network availability, such as denial-of-service (DoS) attacks [7 ...
doi:10.1109/access.2022.3173338
fatcat:jqbe5ornabboznpwghnorqozyu
Embedded System Hardware
[chapter]
2021
Embedded Systems
The need to cover other hardware components as well is a consequence of their impact on the performance, timing characteristics, power consumption, safety, and security. ...
Overall, the idea behind this integration is to avoid extra chips for such functionality. As a result, a whole system is integrated on one chip. ...
Attacks can be partitioned into the following [300]: • Software attacks are based on the execution of software. The deployment of software Trojans is an example of such an attack. ...
doi:10.1007/978-3-030-60910-8_3
fatcat:fqsp2laanfhp5le2d5q3pft2cu
The horns: symbol of power An iconographical study in Mesopotamian Art
2022
مجلة کلیة الآثار . جامعة القاهرة
Human beard, ears, round bulges on his head. ...
(Haller. 1954: abb161, p153) (fig .15)
From Tell Asmar, a statue of the god of fertility appears on its rounded base. ...
doi:10.21608/jarch.2022.212070
fatcat:oh6kcutpt5egjn6inyexswc5xi
COVID-19 in New Orleans: A Nephrology Clinical and Education Perspective and Lessons Learned
2020
Kidney Medicine
New Orleans' first case of COVID-19 was reported on March 9, 2020 with a subsequent rapid rise in the number of cases throughout the state of Louisiana. ...
Traditional educational efforts were no longer viable with social distancing and stay-at-home orders, therefore virtual didactics were integrated into our curriculum. ...
By the time Governor John Bel Edwards issued a statewide stay-at-home order on March 23, Louisiana had more than 1,000 confirmed cases of COVID-19, with one of the highest per capita infection rates in ...
doi:10.1016/j.xkme.2020.09.012
pmid:33283183
pmcid:PMC7708233
fatcat:sx2i7dkj2jc2hn5glhsw5jiwxq
Immunosuppressive therapy for kidney transplantation in adults: a systematic review and economic model
2016
Health Technology Assessment
BEL + MMF appeared more effective than TAC + MMF and SRL + MMF at reducing mortality. ...
SRL + AZA, TAC + AZA, TAC + MMF and BEL + MMF appeared to improve GRF compared with CSA + AZA and MMF + CSA. ...
BEL also reduced the incidence of NODAT. ...
doi:10.3310/hta20620
pmid:27578428
fatcat:jienoy7sbzeq3my2j5sfjjep34
A methodology for studying persistency aspects of internet flows
2005
Computer communication review
Pouzin who constructively commented on the fragmentation and accounting issues; and S. Crocker who commented on the creation and destruction of associations.
Acknowledgments ...
Acknowledgments We would like to thank AT&T Labs Research for providing access to Netflow data and Leibnitz Rechenzentrum, München for their help in collecting packet traces. ...
In our tests, we set M T Uv to 256 bytes. 2. ...
doi:10.1145/1064413.1064417
fatcat:b5leqpkvmnd5paw2vws4mqhlme
Topic Compositional Neural Language Model
[article]
2018
arXiv
pre-print
Further, our model yields sensible topics, and also has the capacity to generate meaningful sentences conditioned on given topics. ...
Experimental results on several corpora show that the proposed approach outperforms both a pure RNN-based model and other topic-guided language models. ...
Specifically, the T experts work together as follows: p(y m ) = softmax(Vh m ) (9) h m = σ(W(t)x m + U(t)h m−1 ) , (10) and W(t) = T k=1 t k • W[k], U(t) = T k=1 t k • U[k] . (11) In order to reduce the ...
arXiv:1712.09783v3
fatcat:4kglybxj7nafnauk3gp26uf5hu
Color Based Image Retrieval System
2012
IOSR Journal of Computer Engineering
In this work we mainly focused on color histogram-based method. ...
The goal of CBIR system is to support image retrieval based on color. In a color based image retrieval system querying can be done by a query image. ...
at time t. ...
doi:10.9790/0661-0150105
fatcat:lwr43nrwu5b6dap3lv5gkm5me4
New Products
1962
Science
It flows through a 12-port manifold, containing the individual samples in their holders, and attacks hydrocarbons in them. ...
The system consists of a lens that is focused on the subject, a fiber optic image converter, an analyzing aperture and a photocell. ...
One master switch controls power on, refrigeration, vacuum, automatic acceleration, and coast and brake sequences. The electric brake reduces coast-down time by 50 percent. ...
doi:10.1126/science.138.3541.739
fatcat:snk3lb2cgnhl5lbxpyngbij3gm
« Previous
Showing results 1 — 15 out of 703 results