A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Towards Easy Leakage Certification
[chapter]
2016
Lecture Notes in Computer Science
To confirm its relevance, we first show that it allows confirming previous results of leakage certification. ...
The recently introduced leakage certification tests aim to guarantee that this condition is fulfilled based on sound statistical arguments. ...
Summarizing, we simplify leakage certification into a set of easy-to-implement procedures, hopefully more attractive for evaluation laboratories, of which we make the prototype implementations available ...
doi:10.1007/978-3-662-53140-2_3
fatcat:2ins2kyhsndyhbqazwowpw3bhi
Page 115 of POWER Vol. 67, Issue 3
[page]
1928
POWER
was asked an applicant for an engineers’ certificate.
It was easy for the applicant to answer, “Because the pump is not removing the water fast enough.” ...
Trouble with gland seal through clogging of the small apertures might cause the leakage. ...
Certificate-based encryption resilient to key leakage
2016
Journal of Systems and Software
This paper puts forward the first certificate-based encryption scheme which can resist not only the decryption key leakage but also the master secret key leakage. ...
While some traditional public key encryption and identity-based encryption with resilient-leakage schemes have been constructed, as far as we know, there is no leakage-resilient scheme in certificate-based ...
Towards the remaining queries, the challenger answers with normal certificate and normal decryption key. ...
doi:10.1016/j.jss.2015.05.066
fatcat:pl3mkln6gzbjtlpdisdfccsswi
Introduction to the CHES 2016 special issue
2017
Journal of Cryptographic Engineering
Towards Easy Leakage Certification proposes a theoretical framework for this open challenge. Another important aspect is security-by-design. ...
Independent third-party testing and certification is crucial to have transparent security levels for the user. ...
doi:10.1007/s13389-017-0158-5
fatcat:3v7bwqafjnhvxfswnv33mtewfi
Towards Reduction of Cost of Software Quality by Implementing Regression Automation
2014
Journal of Industrial and Intelligent Information
Even though the organization has to spend appraisal cost towards automating test cases at component level, integration and UI level considerable amount of savings is expected as the automation tests are ...
DEFECT LEAKAGE PERCENTAGE AND COST OF FIXING THE DEFECT -POST IMPLEMENTATION Team Name
Defect Leakage
Total Cost ($)
A
50.00%
1000
B
63.60%
1600
C
30.00%
500
D
63.16%
1400
E
33.33%
500 ...
doi:10.12720/jiii.2.1.63-66
fatcat:i4bx7n27yvgz5oauf7rhzfxrme
Privacy-Friendly Energy-Metering via Homomorphic Encryption
[chapter]
2011
Lecture Notes in Computer Science
The second part will be more technical and describes protocols for secure communication with E-meters and for fraud detection (leakage) in a privacy-preserving manner, using a combination of Paillier's ...
Following the structure of the No-Leakage-Game, A will create the corresponding certificates cert M1 and cert M2 . ...
More precisely, we assume that there is a trusted certification authority that issues certificates and that the adversary is unable to obtain a large number of public key certificates for which he knows ...
doi:10.1007/978-3-642-22444-7_15
fatcat:3zotw7tttrh3dfegqfoh3x2kze
Inward Leakage in Tight-Fitting PAPRs
2011
Journal of Environmental and Public Health
A combination of local flow measurement techniques and fog flow visualization was used to determine the inward leakage for two tight-fitting powered air-purifying respirators (PAPRs), the 3M Breathe-Easy ...
In both cases, the leakage was not enough for fog to appear at the mouth of the head form. ...
The bronchoscope consisted of a bundle of optical fibers that conducted light toward the tip and an image back from the tip. ...
doi:10.1155/2011/473143
pmid:21647352
pmcid:PMC3103902
fatcat:cyw3hoag4jh4risfu3gm337auq
7S Model for Technology Protection of Organizations
2021
Sustainability
Given the importance of technologies to organizations, technology leakages can cause considerable financial losses and threaten the survival of firms. ...
Although organizations use technology protection diagnostic models to prevent such leakages, most diagnostic models focus on cybersecurity, and the evaluation system is complex, making it difficult for ...
In any case, preventing this exceptional security incident is not easy. ...
doi:10.3390/su13137020
fatcat:ydokaicbjnc7pjcyuut2uktyky
An Assessment of the Effects of Examinational Practice amongst the Students of Umar Suleiman College of Education, Gashua, Yobe State, Nigeria
2020
The International Journal of Humanities & Social Studies
Because provided the examination is difficult the students are trying to find the easy way of passing the exam, since nowadays the examination malpractice became an order of the day in our higher institutions ...
Discussion of Findings Subsequently, the Table two shows responses of the respondent on why do students involve themselves in examination malpractice these involve some negative attitude of students towards ...
findings it supported by WAEC (2003) , identified some method such as leakage of question papers, negative attitude toward reading, lack of confidence on the part of students. ...
doi:10.24940/theijhss/2020/v8/i10/hs2010-058
fatcat:a7wh3x6l7ba5hbipepfjx3shaq
Standards for Surgical Respirators and Masks: Relevance for Protecting Healthcare Workers and the Public During Pandemics
2021
Annals of Work Exposures and Health
Standards used in the USA, European Union (EU), and China were compared with respect to testing methods and certification criteria. ...
The impact of the similarities and differences in testing methods and certification criteria on FFR and mask performance for protecting healthcare workers from SARS-CoV-2 are discussed, as well as the ...
In the EU (EU EN 149+A1, 2009) and China (China National Standard GB 2626 , however, total inward leakage tests are required as part of the respirator certification process. ...
doi:10.1093/annweh/wxab008
pmid:33942848
fatcat:oquoyqhxlrawxk37qcc62v4r3u
An Empirical Assessment of Security Risks of Global Android Banking Apps
[article]
2020
arXiv
pre-print
to fix the weaknesses, such as ICC Leakage, Invalid Certificate, and Insecure Hash Function. ...
Screenshot (88.3%), as an easy-to-use way to harvest users' credentials, is most likely to be neglected by developers. ...
arXiv:1805.05236v5
fatcat:jfky26xmg5f2raijiddda6ouhe
Steps towards the development of a certification system for sustainable bio-energy trade
2006
Biomass & Bioenergy
sustainability standards requires the involvement of stakeholders because sustainability definition has to be performed 3 context specific and according to the priorities and the perceptions of the people towards ...
Scientific research is needed for the development of indicators for such aspects of biomass trade (e.g. leakage), that cannot yet be described by indicators, and for more quantitative indicators. ...
The driving force and motivation of the certification process should not be any certificate label but the wish towards more sustainability. ...
doi:10.1016/j.biombioe.2005.11.003
fatcat:kfu4ifrc2rbbhjua4ceoepfyia
IEA-SHC Task 43: Research and Standardization on Solar Collector Testing and Towards a Global Certification Scheme
2012
Energy Procedia
The new ISO/DIS 9806 standard opens the door to a global certification scheme for solar thermal collectors, thereby helping to overcome problems resulting from many different regional certification schemes ...
Europe, North America, Australia and other individual countries have certification and testing procedures for solar thermal equipment designed to support innovation and product development and to protect ...
A separate paper "Towards global certification of solar collectors" will be presented by Nielsen at SHC 2012. ...
doi:10.1016/j.egypro.2012.11.020
fatcat:lewqfo3yszahbo3zxte3fygzqm
Dude, is my code constant time?
2017
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017
We base our approach on leakage detection techniques, resulting in a very compact, easy to use and easy to maintain tool. ...
Leakage detection tests were introduced by Coron, Naccache and Kocher [CKN00] , [CNK04] shortly after the introduction of DPA [KJJ99] and were targeted towards hardware sidechannel evaluations. ...
More precisely, we base our approach on leakage detection tests. The result is a very compact tool that can be used to test timing variability in cryptographic functions in an easy way. ...
doi:10.23919/date.2017.7927267
dblp:conf/date/ReparazBV17
fatcat:6ng33xq55rh7hjfn7yy4zi2siq
Improved Data Security Protection Mechanism for Cloud Storage using Two Factors
2017
IJARCCE
The sender requires to know identity of receiver but no need of other information such as certificate or public key. To decrypt the cipher text, receiver needs two parts. ...
It provides security against adaptive identity and adaptive condition chosen-cipher text attacks CHK transformation to achieve CCA Security seems un widely [6] Towards a Secure Certificate less Proxy ...
Easy to information sharing between numerous clients. ...
doi:10.17148/ijarcce.2017.6505
fatcat:7onrbz5anfagtpycvojyxzqy54
« Previous
Showing results 1 — 15 out of 7,922 results