Leakage

Results: 1395



#Item
151

Security  and  Communication  Networks  (SCN),  Wiley  InterScience   Special  Issue  on     “Defending  Against  Insider  Threats  and  Internal  Data  Leakage”

Add to Reading List

Source URL: isyou.hosting.paran.com

Language: English - Date: 2010-03-09 10:20:11
    152

    Proceedings on Privacy Enhancing Technologies ; ):20–33 Oleksii Starov, Phillipa Gill, and Nick Nikiforakis Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms

    Add to Reading List

    Source URL: www.securitee.org

    Language: English - Date: 2015-09-01 15:50:16
      153

      Isolation Transformer SM series Outline  Isolation of power supply  Control of leakage current  Creepage distance 8.0mm

      Add to Reading List

      Source URL: www.sumida.com

      Language: English - Date: 2015-04-08 02:36:47
        154

        |1| SLEAK: A Side-channel Leakage Evaluator and Analysis Kit Dan Walters Andrew Hagen

        Add to Reading List

        Source URL: ecewp.ece.wpi.edu

        Language: English - Date: 2015-03-11 09:23:49
          155

          Masking and Leakage-Resilient Primitives: One, the Other(s) or Both? Sonia Bela¨ıd1,2 , Vincent Grosso3 , Fran¸cois Xavier-Standaert3 2

          Add to Reading List

          Source URL: uclouvain.be

          Language: English - Date: 2015-02-13 11:15:42
            156

            Leakage Assessment Methodology - a clear roadmap for side-channel evaluations Tobias Schneider and Amir Moradi Wednesday, September 16th, 2015 Motivation Security Evaluation

            Add to Reading List

            Source URL: www.cryptoexperts.com

            Language: English - Date: 2015-11-13 04:48:41
              157

              Leakage from Sub-national Climate Initiatives: The Case of California Justin Caron, Sebastian Rausch and Niven Winchester Report No. 220 May 2012

              Add to Reading List

              Source URL: globalchange.mit.edu

              Language: English - Date: 2012-05-29 13:33:31
                158

                Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage∗ Giuseppe Ateniese† Sapienza, University of Rome

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2015-09-23 02:44:24
                  159Computing / Software engineering / Security / Data loss prevention software / Data security / Information technology / Hypertext Transfer Protocol / Computer security / JavaScript / World Wide Web / POST

                  DATA LEAKS Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic? David Gugelmann | ETH Zurich

                  Add to Reading List

                  Source URL: www.lenders.ch

                  Language: English - Date: 2015-08-18 10:57:52
                  160

                  CO2Net: A marine monitoring system for CO2 leakage detection

                  Add to Reading List

                  Source URL: reti.dsi.uniroma1.it

                  Language: English - Date: 2012-09-18 04:46:22
                    UPDATE