Search results: Found 2

Listing 1 - 2 of 2
Sort by
Open Access and the Library

Authors: ---
ISBN: 9783038977407 Year: Pages: 142 DOI: 10.3390/books978-3-03897-741-4 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Media and communication
Added to DOAB on : 2019-04-05 10:34:31
License:

Loading...
Export citation

Choose an application

Abstract

Libraries are places of learning and knowledge creation. Over the last two decades, digital technology—and the changes that came with it—have accelerated this transformation to a point where evolution starts to become a revolution.The wider Open Science movement, and Open Access in particular, is one of these changes and is already having a profound impact. Under the subscription model, the role of libraries was to buy or license content on behalf of their users and then act as gatekeepers to regulate access on behalf of rights holders. In a world where all research is open, the role of the library is shifting from licensing and disseminating to facilitating and supporting the publishing process itself.This requires a fundamental shift in terms of structures, tasks, and skills. It also changes the idea of a library’s collection. Under the subscription model, contemporary collections largely equal content bought from publishers. Under an open model, the collection is more likely to be the content created by the users of the library (researchers, staff, students, etc.), content that is now curated by the library.Instead of selecting external content, libraries have to understand the content created by their own users and help them to make it publicly available—be it through a local repository, payment of article processing charges, or through advice and guidance. Arguably, this is an overly simplified model that leaves aside special collections and other areas. Even so, it highlights the changes that research libraries are undergoing, changes that are likely to accelerate as a result of initiatives such as Plan S.This Special Issue investigates some of the changes in today’s library services that relate to open access.

Side Channel Attacks

Author:
ISBN: 9783039210008 / 9783039210015 Year: Pages: 258 DOI: 10.3390/books978-3-03921-001-5 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2019-06-26 08:44:06
License:

Loading...
Export citation

Choose an application

Abstract

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.

Keywords

cache attack --- cache side-channel attack --- constant-time cryptographic algorithm --- rsa cryptosystem --- scatter-gather implementation --- modular exponentiation --- post-quantum cryptography --- lattice-based cryptography --- Gaussian sampling --- CDT sampling --- side-channel attack --- single trace analysis --- mobile ads --- software development kit (SDK), android package (APK), ad lib --- ad libraries --- ad networks --- graph --- graph similarity --- side-channel authentication --- leakage model --- AES --- FPGA --- unified point addition --- binary Huff curve --- recovery of secret exponent by triangular trace analysis --- horizontal collision correlation analysis --- side channel analysis --- single trace analysis --- post quantum cryptography --- NTRU --- side-channel analysis --- elliptic curve cryptography --- single-trace attack --- key bit-dependent attack --- countermeasure --- side channel analysis --- financial IC card --- first-order analysis --- second-order analysis --- data outsourcing --- integrity --- online authentication --- Merkle (hash) tree --- data loss --- information leakage --- reliability --- side-channel analysis --- power-analysis attack --- embedded system security --- machine-learning classification --- side-channel cache attacks --- cache misses --- AES --- cloud computing --- physically unclonable function --- chaos theory --- chaotic circuit --- FPGA --- CPLD --- challenge-response authentication --- hardware security --- side-channel attacks --- cryptographic keys --- side channel attack --- re-keying --- tweakable block cipher --- provable security --- n/a

Listing 1 - 2 of 2
Sort by
Narrow your search

Publisher

MDPI - Multidisciplinary Digital Publishing Institute (2)


License

CC by-nc-nd (2)


Language

eng (2)


Year
From To Submit

2019 (2)