搜索结果: 1-5 共查到“军事学 Risk”相关记录5条 . 查询时间(0.125 秒)
Centralized reputation systems use stars and reviews and thus require algorithm secrecy to avoid manipulation. In autonomous open source decentralized systems this luxury is not available. We create a...
Moderate dietary fat consumption as a risk factor for ischemic heart disease in a population with a low fat intake: a case-control study in Korean men
Republic of Korea men case-control study
2016/6/13
Dietary fat intake is associated with the incidence
of ischemic heart disease (IHD) in Western countries. In populations
in which both the average dietary fat consumption and the
incidence of IHD a...
Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk
random number generation TRNG ring oscillator
2016/1/3
Fibonacci ring oscillators are shown to have a risk to oscillate periodically instead of chaotically. The security implications of this are discussed. The probability of the occurrence of the periodic...
The literature on side-channel analysis describes numerous masking schemes designed to protect block ciphers at the implementation level. Such masking schemes typically require the computation of mask...
Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
Key Lifetimes Fault-Attacks Dependability Security Policies Cryptographic Key Failure Tolerance
2009/4/2
With physical attacks threatening the security of current
cryptographic schemes, no security policy can be developed without taking
into account the physical nature of computation.
In this article ...