Information Technology Channel

Results: 400



#Item
1A Statistical Property of Wireless Channel Capacity Fengyou Sun, Yuming Jiang Department of Information Security and Communication Technology NTNU – Norwegian University of Science and Technology Trondheim, Norway

A Statistical Property of Wireless Channel Capacity Fengyou Sun, Yuming Jiang Department of Information Security and Communication Technology NTNU – Norwegian University of Science and Technology Trondheim, Norway

Add to Reading List

Source URL: disco.cs.uni-kl.de

Language: English - Date: 2018-03-05 21:39:26
    2What Is the IT Channel? The Information Technology (IT) industry is made up of professionals who deliver a complex array of hardware, software, communications and services that store, retrieve, manipulate and communicate

    What Is the IT Channel? The Information Technology (IT) industry is made up of professionals who deliver a complex array of hardware, software, communications and services that store, retrieve, manipulate and communicate

    Add to Reading List

    Source URL: www.channel-navigator.com

    - Date: 2013-11-13 10:00:42
      3Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage John Demme Robert Martin Adam Waksman Simha Sethumadhavan Computer Architecture Security and Technology Lab Department of Computer Science, Co

      Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage John Demme Robert Martin Adam Waksman Simha Sethumadhavan Computer Architecture Security and Technology Lab Department of Computer Science, Co

      Add to Reading List

      Source URL: www.cs.columbia.edu

      - Date: 2012-06-11 10:18:08
        4Efficient Side-Channel Measurements Targeting Low-Power MCUs Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

        Efficient Side-Channel Measurements Targeting Low-Power MCUs Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

        Add to Reading List

        Source URL: www.iaik.tugraz.at

        - Date: 2015-11-30 11:00:03
          5Tapping the full potential of DRAM-based covert channels Advisor(s): Peter Pessl Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

          Tapping the full potential of DRAM-based covert channels Advisor(s): Peter Pessl Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

          Add to Reading List

          Source URL: www.iaik.tugraz.at

          Language: English - Date: 2015-11-30 11:00:03
          6Channel Partner Product QuickBrief  LogMatrix NerveCenter What Is It? NerveCenter is a network management toolkit that enables network operators to extend the functionality of

          Channel Partner Product QuickBrief LogMatrix NerveCenter What Is It? NerveCenter is a network management toolkit that enables network operators to extend the functionality of

          Add to Reading List

          Source URL: logmatrix.com

          Language: English - Date: 2014-05-20 18:13:48
          7Colloquium Department of Computer Science Dr. Koushik Sinha Koushik Sinha is a Senior Software Engineer with the Social Computing Group of Qatar Computing Research Institute. He has over 10 years of experience in applied

          Colloquium Department of Computer Science Dr. Koushik Sinha Koushik Sinha is a Senior Software Engineer with the Social Computing Group of Qatar Computing Research Institute. He has over 10 years of experience in applied

          Add to Reading List

          Source URL: www.cs.siu.edu

          Language: English - Date: 2015-03-23 12:09:58
          8Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

          Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

          Add to Reading List

          Source URL: www.iaik.tugraz.at

          Language: English - Date: 2015-11-30 11:00:03
          9Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

          Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

          Add to Reading List

          Source URL: www.iaik.tugraz.at

          Language: English - Date: 2015-11-30 11:00:03