Leakage

Results: 1395



#Item
21

ESCA Bullseye Wet and Dry HEPA Vacs All Bullseye HEPA Vacuum Cleaners are tested for bypass leakage in accordance with the methods and procedures contained in Brookhaven Na onal Laboratory Standard IH62350 “HEPA Filter

Add to Reading List

Source URL: www.tridentsecuritygroup.com

Language: English - Date: 2016-04-06 11:35:56
    22

    Duct Testing Standard (RS-33) For New and Existing ConstructionWSEC) New Construction Based on the protocol for “Total Leakage Testing,” or “Leakage Testing to Outdoors” duct leakage in new construction sh

    Add to Reading List

    Source URL: www.energy.wsu.edu

    Language: English - Date: 2016-04-19 13:45:42
      23

      You Shouldn’t Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps Jin Chen and Haibo Chen, Shanghai Jiao Tong University; Erick Bauman and Zhiqiang Lin, The University of Texas at Dallas; Binyu

      Add to Reading List

      Source URL: web.cse.ohio-state.edu

      Language: English - Date: 2018-01-07 13:07:06
        24

        Media Scanner for Data Protection—Websites Data leakage results in lost revenue and privacy violations Occurring with greater and greater frequency, data leakage is the collection of your valuable first-party data by

        Add to Reading List

        Source URL: www.themediatrust.com

        Language: English - Date: 2015-04-07 09:27:10
          25

          A figure of merit for constraining instrumental polarization systematics in the delay spectrum Zachary Martinot August 15, 2017 Abstract A figure of merit for comparing the polarization leakage of different antenna desig

          Add to Reading List

          Source URL: reionization.org

          Language: English - Date: 2017-09-11 19:39:34
            26

            SwissShield® Daylite™ RF Shielding Fabric Excellent skin compatible fabric for radiofrequency shielding (cellphones and cell tower radiation, cordless phones, wi-fi, radar, microwave oven leakage, TV broadcast etc). E

            Add to Reading List

            Source URL: lessemf.com

            Language: English - Date: 2011-12-09 10:06:42
              27

              2010 23rd IEEE Computer Security Foundations Symposium Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks Boris K¨opf MPI-SWS

              Add to Reading List

              Source URL: users.cis.fiu.edu

              Language: English - Date: 2014-09-02 15:19:21
                28Circuit complexity / Theoretical computer science / Complexity classes / Electrical engineering / Cryptographic protocols / Secure multi-party computation / Computational complexity theory / Digital circuits / Computer science / NC / CC / Boolean circuit

                How to Construct a Leakage-Resilient (Stateless) Trusted Party Daniel Genkin Yuval Ishai Mor Weiss

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2017-12-04 14:17:17
                29

                Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Thomas Ristenpart∗ ∗

                Add to Reading List

                Source URL: www.cs.tau.ac.il

                Language: English - Date: 2009-08-19 10:54:42
                  30

                  TECHNICAL DATA SHEET ELV - WIDEBAND EARTH LEAKAGE RELAY Compliant with AS/NZS 2081:2011, Section 6 Applications

                  Add to Reading List

                  Source URL: www.ampcontrolgroup.com

                  Language: English - Date: 2017-05-23 00:52:18
                    UPDATE