Secure channel

Results: 85



#Item
1

SPASCA: Secure-Programming Assistant and Side-Channel Analyzer Technical Report TUD-CSNovember 2017 Ximeng Li, Heiko Mantel, Johannes Schickel, Markus Tasch, Iva Toteva, Alexandra Weber

Add to Reading List

Source URL: www.mais.informatik.tu-darmstadt.de

Language: English - Date: 2017-11-30 03:32:58
    2

    Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Attacks Mengjia Yan, Bhargava Gopireddy, Thomas Shull, Josep Torrellas University of Illinois at Urbana-Champaign http:/

    Add to Reading List

    Source URL: iacoma.cs.uiuc.edu

    - Date: 2017-06-27 23:37:45
      3

      MIMO Wiretap Channel with ISI Heterogeneity– Achieving Secure DoF with no CSI Jean de Dieu Mutangana Deepak Kumar

      Add to Reading List

      Source URL: www2.engr.arizona.edu

      - Date: 2017-11-26 18:48:13
        4

        Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Attacks Mengjia Yan, Bhargava Gopireddy, Thomas Shull, Josep Torrellas University of Illinois at Urbana-Champaign http:/

        Add to Reading List

        Source URL: iacoma.cs.uiuc.edu

        - Date: 2017-04-29 20:04:46
          5

          Sixth Annual Conference on Privacy, Security and Trust A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

          Add to Reading List

          Source URL: rayb.info

          - Date: 2016-08-19 22:20:15
            6

            Help Customers ‘Walk Out Working’ Faster Secure, Multi-Channel Content Transfer Platform Meets all Mobile Customer and Store Service Demands Our flexible, hybrid content transfer delivery model enables full or partia

            Add to Reading List

            Source URL: www.cellebrite.com

            - Date: 2015-09-07 03:49:43
              7Cryptography / Key management / Public-key cryptography / Public key infrastructure / DiffieHellman key exchange / Key-agreement protocol / Information-theoretic security / IEEE 802.11 / RSA / Key generation / Key distribution / Secure channel

              Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

              Add to Reading List

              Source URL: www.winlab.rutgers.edu

              Language: English - Date: 2011-08-05 21:36:39
              8Cryptography / Advanced Encryption Standard / X86 instructions / Rambus / Side-channel attack / AES instruction set / Cryptography Research / Masking / Technology / Computing

              Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

              Add to Reading List

              Source URL: www.hotchips.org

              Language: English - Date: 2015-08-21 02:18:30
              9Cryptography / Steganography / Mathematics / Steganalysis / Digital watermarking / JPEG / Error detection and correction / Subliminal channel / Embedding / Bit error rate / Steganography tools / Steganographic file system

              A Secure Robust Image Steganographic Model  Yeuan-Kuen Lee and Ling-Hwei Chen Department of Computer and Information Science National Chiao Tung University, Hsinchu 30050, Taiwan, R.O.C. email: .

              Add to Reading List

              Source URL: debut.cis.nctu.edu.tw

              Language: English - Date: 2013-07-12 03:09:44
              10

              Vertical Protocol Composition Thomas Groß IBM Research Email: Abstract—The security of key exchange and secure channel

              Add to Reading List

              Source URL: www2.imm.dtu.dk

              Language: English - Date: 2011-06-07 11:01:49
                UPDATE