Leakage

Results: 1395



#Item
1USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Yang Su University of Adelaide  Damith Ranasinghe University of Adelaide

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Yang Su University of Adelaide Damith Ranasinghe University of Adelaide

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2017-08-28 17:01:11
2Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Zvika Brakerski∗ Alex Lombardi†

Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Zvika Brakerski∗ Alex Lombardi†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-10-01 05:36:24
3Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK  Abstract—The output

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
4A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
5Quantifying Location Privacy Leakage from Transaction Prices Arthur Gervais1(B) , Hubert Ritzdorf1 , Mario Lucic1 , Vincent Lenders2 , and Srdjan Capkun1 1

Quantifying Location Privacy Leakage from Transaction Prices Arthur Gervais1(B) , Hubert Ritzdorf1 , Mario Lucic1 , Vincent Lenders2 , and Srdjan Capkun1 1

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2016-11-01 06:37:08
6LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1  School of Computer Science, University of Birmingham, UK

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
7Computing and Estimating Information Leakage with a Quantitative Point-to-Point Information Flow Model by

Computing and Estimating Information Leakage with a Quantitative Point-to-Point Information Flow Model by

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
8Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, and Alexandra Weber Computer Science De

Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, and Alexandra Weber Computer Science De

Add to Reading List

Source URL: www.mais.informatik.tu-darmstadt.de

Language: English - Date: 2018-02-22 05:33:27
    9Work-in-Progress: RWS – A Roulette Wheel Scheduler for Preventing Execution Pattern Leakage Ying Zhang, Lingxiang Wang, Wei Jiang, Zhishan Guo Department of Computer Science, Missouri S&T Presenter: Zheng Dong*

    Work-in-Progress: RWS – A Roulette Wheel Scheduler for Preventing Execution Pattern Leakage Ying Zhang, Lingxiang Wang, Wei Jiang, Zhishan Guo Department of Computer Science, Missouri S&T Presenter: Zheng Dong*

    Add to Reading List

    Source URL: 2018.rtas.org

    Language: English - Date: 2018-05-06 16:29:41
      10

      Reducing Gate-Driven Leakage in 2D Semiconductors: Two-dimensional materials such as graphene and MoS2 have a wide range of bandgaps and effective masses, making them suitable for many different applications including m

      Add to Reading List

      Source URL: btbmarketing.com

      Language: English - Date: 2017-10-16 22:17:26