First Page | Document Content | |
---|---|---|
Date: 2011-10-24 09:10:14 | Calculating Bounds on Information Leakage Using Two-Bit Patterns Ziyuan Meng Geoffrey SmithAdd to Reading ListSource URL: users.cis.fiu.eduDownload Document from Source WebsiteFile Size: 252,22 KBShare Document on Facebook |