• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 208
  • 30
  • 30
  • 28
  • 22
  • 20
  • 6
  • 6
  • 6
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • Tagged with
  • 479
  • 140
  • 115
  • 65
  • 58
  • 56
  • 51
  • 50
  • 50
  • 48
  • 42
  • 40
  • 38
  • 37
  • 36
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
461

Méthodologie et développement de solutions pour la sécurisation des circuits numériques face aux attaques en tensions / Methodology and design of solutions to secure digital circuits against power attacks

Gomina, Kamil 11 September 2014 (has links)
Les applications grand public comme la téléphonie mobile ou les cartes bancaires manipulent des données confidentielles. A ce titre, les circuits qui les composent font de plus en plus l'objet d'attaques qui présentent des menaces pour la sécurité des données. Les concepteurs de systèmes sur puce (SoC) doivent donc proposer des solutions sécurisées, tout en limitant le coût et la complexité globale des applications. L’analyse des attaques existantes sur les circuits numériques nous a orienté vers celles se basant sur la tension d'alimentation, dans des nœuds technologiques avancés.Dans un premier temps, nous avons déterminé la signature électrique d’un circuit en phase de conception. Pour cela, un modèle électrique a été proposé, prenant en compte la consommation en courant et la capacité de la grille d'alimentation. L'extraction de ces paramètres ainsi que l'évaluation du modèle sont présentées. L’utilisation de ce modèle a permis de mesurer la vulnérabilité d’un circuit mais aussi d’évaluer quantitativement des contremesures, notamment celle utilisant des capacités de découplage. Ensuite, l’étude se consacre à l’injection de fautes par impulsions de tension d’alimentation. Les mécanismes d’injection de fautes sur des circuits numériques ont été étudiés. Dès lors, des solutions de détection d’attaques ont été proposées et évaluées à la fois en simulation et par des tests électriques sur circuit. Les résultats ont permis de confirmer les analyses théoriques et la méthodologie utilisée.Ce travail a ainsi montré la faisabilité de solutions à bas coût contre les attaques actives et passives en tension, utilisables dans le cadre d’un développement industriel de produits. / General use products as mobile phones or smartcards manipulate confidential data. As such, the circuits composing them are more and more prone to physical attacks, which involve a threat for their security. As a result, SoC designers have to develop efficient countermeasures without increasing overall cost and complexity of the final application. The analysis of existing attacks on digital circuits leads to consider power attacks, in advanced technology nodes.First of all, the power signature of a circuit was determined at design time. To do so, an electrical model was suggested based on the current consumption and the overall power grid capacitance. The methodology to extract these parameters, as well as the evaluation of the model are presented. This model allows designers to anticipate information leakage at design time and to quantify the protection of countermeasures, as the use of integrated decoupling capacitors. Then, the study was dedicated to power glitch attacks. The different fault injection mechanisms were analyzed in details. From then on, a set of detection circuits were suggested and evaluated at design time and on silicon by electrical tests. Both the theoretical analysis and the given methodology were confirmed by the test campaigns.This work demonstrated that the design of low-cost solutions against passive and active power attacks can be achieved, and used in a large scale product development.
462

Návrh a implementace elektronického obchodu společnosti / E-shop design and implementation of company

Horsák, David January 2008 (has links)
This diploma work characterizes and analyzes the business company. It contains method of solving problems, consequent on the analysis, solving implementation problems and it is project tools for improve future position of company on market by means of electronic market. For further, it is describe economics analysis of design e-shop and it is implementation in chosen company.
463

Distributed P2P Data Backup System / Distributed P2P Data Backup System

Mészáros, István January 2013 (has links)
Tato diplomová práce představuje model a prototyp kooperativního distributivního systému zálohování dat založeném na P2P komunikační síti. Návrh systému umožňuje uživatelům přispět svým lokálním volným místem na disku do systému výměnou za spolehlivé úložiště jejich dat u jiných uživatelů. Představené řešení se snaží splnit požadavky uživatelů na ukládání dat, zároveň však také řeší, jak se vypořádat s mírou nepředvídatelnosti uživatelů  ohledně poskytování volného místa. To je prováděno dvěma způsoby - využitím Reed - Solomon kódů a zároveň také tím, že poskytuje možnost nastavení parametrů dostupnosti. Jedním z těchto parametrů je časový rozvrh, který značí, kdy uživatel může nabídnout předvídatelný přínos do systému. Druhý parametr se týká spolehlivosti konkrétního uživatele v rámci jeho slíbeného časového úseku. Systém je schopen najít synchronizaci ukládaných dat na základě těchto parametrů. Práce se zaměřuje rovněž na řešení zabezpečení systému proti širšímu spektru možných útoků. Hlavním cílem je publikovat koncept a prototyp. Jelikož se jedná o relativně nové řešení, je důležitá také zpětná vazba od široké veřejnosti, která může produkt používat. Právě jejich komentáře a připomínky jsou podnětem pro další vývoj systému.
464

Mitteilungen des URZ 1/2/1996

Riedel, Ursula, Richter, Frank, Huebner, Uwe, Wunderlich, Jan, Trapp, Holger, Clauss, Matthias, Baensch, Karsten, Plichta, Christa, Riedel, Wolfgang, Dippmann, D., Winkler, Jürgen 20 August 1996 (has links)
Neuer WWW-Server Metacomputing - neue Aufgabenverteilung im Netz Harvest Secure Shell Nutzung der WS-Pools SW-Umgebung Parsytec URZ auf der CeBit Software-News Dienste des URZ - Ueberblick
465

Mitteilungen des URZ 2/1998

Huebner, U., Grunewald, Heide, Huettmann, Trapp 05 August 1998 (has links)
Perspektiven im Netzbereich C.A.N. - Chemnitzer AbsolventenNetz Grafische Benutzeroberfl¨achen im Netz (VNC) PGP 5.x und GNUPG Neuigkeiten bei der Secure Shell (SSH) Vim 5.x Richtlinien zur Sicherheit im Campusnetz Ein Jahr Einsatz von Windows NT im URZ
466

Privacy preserving software engineering for data driven development

Tongay, Karan Naresh 14 December 2020 (has links)
The exponential rise in the generation of data has introduced many new areas of research including data science, data engineering, machine learning, artificial in- telligence to name a few. It has become important for any industry or organization to precisely understand and analyze the data in order to extract value out of the data. The value of the data can only be realized when it is put into practice in the real world and the most common approach to do this in the technology industry is through software engineering. This brings into picture the area of privacy oriented software engineering and thus there is a rise of data protection regulation acts such as GDPR (General Data Protection Regulation), PDPA (Personal Data Protection Act), etc. Many organizations, governments and companies who have accumulated huge amounts of data over time may conveniently use the data for increasing business value but at the same time the privacy aspects associated with the sensitivity of data especially in terms of personal information of the people can easily be circumvented while designing a software engineering model for these types of applications. Even before the software engineering phase for any data processing application, often times there can be one or many data sharing agreements or privacy policies in place. Every organization may have their own way of maintaining data privacy practices for data driven development. There is a need to generalize or categorize their approaches into tactics which could be referred by other practitioners who are trying to integrate data privacy practices into their development. This qualitative study provides an understanding of various approaches and tactics that are being practised within the industry for privacy preserving data science in software engineering, and discusses a tool for data usage monitoring to identify unethical data access. Finally, we studied strategies for secure data publishing and conducted experiments using sample data to demonstrate how these techniques can be helpful for securing private data before publishing. / Graduate
467

Interrelations of Family Differentiation, Attachment, and Parenting with Identity Development in Emerging Adults

Bortz, Patrick Robert January 2020 (has links)
No description available.
468

An Investigation of the Linkage between Father-Nurture and Leadership Capacities

McNeal, Zakiya 17 May 2022 (has links)
No description available.
469

A Narrative Study of Emotions Associated with Negative Childhood Experiences Reported in the Adult Attachment Interview

Hartman, Lynne I. 29 October 2015 (has links)
No description available.
470

Ammunition stocks: Promoting safe and secure storage and disposal.

Greene, Owen J., Holt, Sally E., Wilkinson, Adrian January 2004 (has links)
yes / [Introduction]International commitments and measures to prevent, reduce and combat uncontrolled or illicit small arms and light weapons (SALW) holdings and flows are widely understood to encompass not only the weapons but also their ammunition. This is obviously necessary. Thus the UN Programme of Action to Prevent Combat and Eradicate the Illicit Trade in Small Arms and Light Weapons in All Its Aspects (PoA) includes many commitments that apply to ammunition as well as to small and light weapons. Progress in implementing the PoA includes many measures concerning ammunition, including: controls on transfers; preventing diversion to illicit trade; marking, record-keeping and tracing; weapons collection; secure storage; and destruction.1 Unfortunately, progress in implementing the PoA in relation to ammunition remains particularly patchy and inadequate. This is partly because it has too often been considered as a residual category. Negotiations and programmes to control SALW have tended in the first instance to focus on the weapons systems, and have then been deemed to apply, `as appropriate¿, also to ammunition. But control and reduction of ammunition raise their own distinct and challenging issues. Without focused attention, and clarification of what is meant by `appropriate¿, controls and measures on ammunition have often been neglected or mishandled.[Executive summary] The 2001 United Nations Programme of Action to Prevent, Combat and Eradicate the Illicit Trade in Small Arms and Light Weapons in All Its Aspects (PoA) and other associated Small Arms and Light Weapons (SALW) international commitments and measures are widely understood to encompass not only the weapons but also their ammunition. Unfortunately, progress in implementing the PoA in relation to ammunition remains particularly patchy and inadequate. This is partly because it has too often been considered as a residual category. But control and reduction of ammunition raise their own distinct and challenging issues. This relative neglect is resulting in large numbers of avoidable deaths and injuries.

Page generated in 0.1191 seconds