Secure channel

Results: 85



#Item
1SPASCA: Secure-Programming Assistant and Side-Channel Analyzer Technical Report TUD-CSNovember 2017 Ximeng Li, Heiko Mantel, Johannes Schickel, Markus Tasch, Iva Toteva, Alexandra Weber

SPASCA: Secure-Programming Assistant and Side-Channel Analyzer Technical Report TUD-CSNovember 2017 Ximeng Li, Heiko Mantel, Johannes Schickel, Markus Tasch, Iva Toteva, Alexandra Weber

Add to Reading List

Source URL: www.mais.informatik.tu-darmstadt.de

Language: English - Date: 2017-11-30 03:32:58
    2Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Attacks Mengjia Yan, Bhargava Gopireddy, Thomas Shull, Josep Torrellas University of Illinois at Urbana-Champaign http:/

    Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Attacks Mengjia Yan, Bhargava Gopireddy, Thomas Shull, Josep Torrellas University of Illinois at Urbana-Champaign http:/

    Add to Reading List

    Source URL: iacoma.cs.uiuc.edu

    - Date: 2017-06-27 23:37:45
      3MIMO Wiretap Channel with ISI Heterogeneity– Achieving Secure DoF with no CSI Jean de Dieu Mutangana Deepak Kumar

      MIMO Wiretap Channel with ISI Heterogeneity– Achieving Secure DoF with no CSI Jean de Dieu Mutangana Deepak Kumar

      Add to Reading List

      Source URL: www2.engr.arizona.edu

      - Date: 2017-11-26 18:48:13
        4Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Attacks Mengjia Yan, Bhargava Gopireddy, Thomas Shull, Josep Torrellas University of Illinois at Urbana-Champaign http:/

        Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Attacks Mengjia Yan, Bhargava Gopireddy, Thomas Shull, Josep Torrellas University of Illinois at Urbana-Champaign http:/

        Add to Reading List

        Source URL: iacoma.cs.uiuc.edu

        - Date: 2017-04-29 20:04:46
          5Sixth Annual Conference on Privacy, Security and Trust  A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

          Sixth Annual Conference on Privacy, Security and Trust A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

          Add to Reading List

          Source URL: rayb.info

          - Date: 2016-08-19 22:20:15
            6Help Customers ‘Walk Out Working’ Faster Secure, Multi-Channel Content Transfer Platform Meets all Mobile Customer and Store Service Demands Our flexible, hybrid content transfer delivery model enables full or partia

            Help Customers ‘Walk Out Working’ Faster Secure, Multi-Channel Content Transfer Platform Meets all Mobile Customer and Store Service Demands Our flexible, hybrid content transfer delivery model enables full or partia

            Add to Reading List

            Source URL: www.cellebrite.com

            - Date: 2015-09-07 03:49:43
              7Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

              Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

              Add to Reading List

              Source URL: www.winlab.rutgers.edu

              Language: English - Date: 2011-08-05 21:36:39
              8Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

              Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

              Add to Reading List

              Source URL: www.hotchips.org

              Language: English - Date: 2015-08-21 02:18:30
              9A Secure Robust Image Steganographic Model  Yeuan-Kuen Lee and Ling-Hwei Chen Department of Computer and Information Science National Chiao Tung University, Hsinchu 30050, Taiwan, R.O.C. email: .

              A Secure Robust Image Steganographic Model  Yeuan-Kuen Lee and Ling-Hwei Chen Department of Computer and Information Science National Chiao Tung University, Hsinchu 30050, Taiwan, R.O.C. email: .

              Add to Reading List

              Source URL: debut.cis.nctu.edu.tw

              Language: English - Date: 2013-07-12 03:09:44
              10Vertical Protocol Composition Thomas Groß IBM Research Email:   Abstract—The security of key exchange and secure channel

              Vertical Protocol Composition Thomas Groß IBM Research Email: Abstract—The security of key exchange and secure channel

              Add to Reading List

              Source URL: www2.imm.dtu.dk

              Language: English - Date: 2011-06-07 11:01:49