Zobrazeno 1 - 10
of 125
pro vyhledávání: '"Akhilesh Tyagi"'
Autor:
Ravikumar Selvam, Akhilesh Tyagi
Publikováno v:
Cryptography, Vol 8, Iss 1, p 1 (2023)
Over the past decade, significant research has been performed on power side-channel mitigation techniques. Logic families based on secret sharing schemes, such as t-private logic, that serve to secure cryptographic implementations against power side-
Externí odkaz:
https://doaj.org/article/e58c58ebee3d4849899fb504fd8c0248
Autor:
Xinyao Li, Akhilesh Tyagi
Publikováno v:
Sensors, Vol 23, Iss 16, p 7229 (2023)
Over the last ten years, there has been a significant interest in employing nonnegative matrix factorization (NMF) to reduce dimensionality to enable a more efficient clustering analysis in machine learning. This technique has been applied in various
Externí odkaz:
https://doaj.org/article/e8da67166aa64104b72ce5ea7998a24f
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 19, Iss 3, Pp 8-13 (2021)
A controller in adaptive control theory is a critical part in mission critical applications in military and computer-controlled systems. An ability to identify and follow the binary instruction execution in the controller part enables fault identific
Externí odkaz:
https://doaj.org/article/d0660b6e3ac24c85804404cdd9917c24
Autor:
Xinyao Li, Akhilesh Tyagi
Publikováno v:
Sensors, Vol 22, Iss 19, p 7354 (2022)
The TrustZone technology is incorporated in a majority of recent ARM Cortex A and Cortex M processors widely deployed in the IoT world. Security critical code execution inside a so-called secure world is isolated from the rest of the application exec
Externí odkaz:
https://doaj.org/article/292ab47633254b21af14349c9bfff490
Autor:
Ravikumar Selvam, Akhilesh Tyagi
Publikováno v:
Sensors, Vol 22, Iss 6, p 2242 (2022)
In this paper, residue number system (RNS) based logic is proposed as a protection against power side-channel attacks. Every input to RNS logic is encrypted as a share of the original input in the residue domain through modulus values. Most existing
Externí odkaz:
https://doaj.org/article/01b3e1d597da4fc9a927e88f1fe98f59
Publikováno v:
Cryptography, Vol 6, Iss 2, p 14 (2022)
Mobile banking, shopping, and in-app purchases utilize persistent authentication states for access to sensitive data. One-shot authentication permits access for a fixed time period. For instance, a username/password-based authentication allows a user
Externí odkaz:
https://doaj.org/article/247ab122c2e54f448d3fb6e2166932c7
Publikováno v:
Cryptography, Vol 2, Iss 3, p 22 (2018)
Physical Unclonable Functions (PUFs) are designed to extract physical randomness from the underlying silicon. This randomness depends on the manufacturing process. It differs for each device. This enables chip-level authentication and key generation
Externí odkaz:
https://doaj.org/article/3b92b6a5827e450f85dbb8f8f1c27316
Autor:
Lukas A. Mueller, René Klein Lankhorst, Steven D. Tanksley, James J. Giovannoni, Ruth White, Julia Vrebalov, Zhangjun Fei, Joyce van Eck, Robert Buels, Adri A. Mills, Naama Menda, Isaak Y. Tecle, Aureliano Bombarely, Stephen Stack, Suzanne M. Royer, Song-Bin Chang, Lindsay A. Shearer, Byung Dong Kim, Sung-Hwan Jo, Cheol-Goo Hur, Doil Choi, Chang-Bao Li, Jiuhai Zhao, Hongling Jiang, Yu Geng, Yuanyuan Dai, Huajie Fan, Jinfeng Chen, Fei Lu, Jinfeng Shi, Shouhong Sun, Jianjun Chen, Xiaohua Yang, Chen Lu, Mingsheng Chen, Zhukuan Cheng, Chuanyou Li, Hongqing Ling, Yongbiao Xue, Ying Wang, Graham B. Seymour, Gerard J. Bishop, Glenn Bryan, Jane Rogers, Sarah Sims, Sarah Butcher, Daniel Buchan, James Abbott, Helen Beasley, Christine Nicholson, Clare Riddle, Sean Humphray, Karen McLaren, Saloni Mathur, Shailendra Vyas, Amolkumar U. Solanke, Rahul Kumar, Vikrant Gupta, Arun K. Sharma, Paramjit Khurana, Jitendra P. Khurana, Akhilesh Tyagi, Sarita, Parul Chowdhury, Smriti Shridhar, Debasis Chattopadhyay, Awadhesh Pandit, Pradeep Singh, Ajay Kumar, Rekha Dixit, Archana Singh, Sumera Praveen, Vivek Dalal, Mahavir Yadav, Irfan Ahmad Ghazi, Kishor Gaikwad, Tilak Raj Sharma, Trilochan Mohapatra, Nagendra Kumar Singh, Dóra Szinay, Hans de Jong, Sander Peters, Marjo van Staveren, Erwin Datema, Mark W.E.J. Fiers, Roeland C.H.J. van Ham, P. Lindhout, Murielle Philippot, Pierre Frasse, Farid Regad, Mohamed Zouine, Mondher Bouzayen, Erika Asamizu, Shusei Sato, Hiroyuki Fukuoka, Satoshi Tabata, Daisuke Shibata, Miguel A. Botella, M. Perez-Alonso, V. Fernandez-Pedrosa, Sonia Osorio, Amparo Mico, Antonio Granell, Zhonghua Zhang, Jun He, Sanwen Huang, Yongchen Du, Dongyu Qu, Longfei Liu, Dongyuan Liu, Jun Wang, Zhibiao Ye, Wencai Yang, Guoping Wang, Alessandro Vezzi, Sara Todesco, Giorgio Valle, Giulia Falcone, Marco Pietrella, Giovanni Giuliano, Silvana Grandillo, Alessandra Traini, Nunzio D'Agostino, Maria Luisa Chiusano, Mara Ercolano, Amalia Barone, Luigi Frusciante, Heiko Schoof, Anika Jöcker, Rémy Bruggmann, Manuel Spannagl, Klaus X.F. Mayer, Roderic Guigó, Francisco Camara, Stephane Rombauts, Jeffrey A. Fawcett, Yves Van de Peer, Sandra Knapp, Dani Zamir, Willem Stiekema
Publikováno v:
The Plant Genome, Vol 2, Iss 1, Pp 78-92 (2009)
The genome of tomato ( L.) is being sequenced by an international consortium of 10 countries (Korea, China, the United Kingdom, India, the Netherlands, France, Japan, Spain, Italy, and the United States) as part of the larger “International Solanac
Externí odkaz:
https://doaj.org/article/1858359b6c874685a9198d615b63ad63
Autor:
Akanksha Bhatnagar, Naini Burman, Eshan Sharma, Akhilesh Tyagi, Paramjit Khurana, Jitendra P. Khurana
Plants possess well-developed light sensing mechanisms and signal transduction systems for regulating photomorphogenesis. ELONGATED HYOCOTYL 5 (HY5), a basic leucine zipper transcription factor, has been extensively characterized in dicot plants. In
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d3fb947c0b65f815ec67887b64b17ffe
https://doi.org/10.1101/2023.01.30.526072
https://doi.org/10.1101/2023.01.30.526072
Autor:
Ravikumar Selvam, Akhilesh Tyagi
Publikováno v:
SN Computer Science. 4