Leakage

Results: 1395



#Item
1USB / Computer hardware / Computing / PS/2 port / Y-cable / Bus / Serial communication / Serial ATA / Wireless USB / USB On-The-Go

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Yang Su University of Adelaide Damith Ranasinghe University of Adelaide

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2017-08-28 17:01:11
2Cryptography / Public-key cryptography / Cryptographic protocols / Identity-based cryptography / ID-based encryption / Functional encryption / Garbled circuit / Encryption / Secure multi-party computation / Attribute-based encryption / RSA / Chosen-ciphertext attack

Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Zvika Brakerski∗ Alex Lombardi†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-10-01 05:36:24
3Mathematical analysis / Mathematics / Experiment / Information theory / Statistical theory / Measure theory / Random variable / Statistical randomness / Sigma-algebra / Probability distribution / Joint probability distribution / Probability space

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
4Information theory / Cryptography / Information / Electrical engineering / Information flow / Information leakage / Leak / Entropy / Weka / Memory leak / Mutual information / Biometric passport

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
5Information theory / Statistical theory / Probability and statistics / Consumer behaviour / Consumer theory / Marketing performance measurement / Probability / Prior probability / Conditional probability / Privacy / Advantage / Entropy

Quantifying Location Privacy Leakage from Transaction Prices Arthur Gervais1(B) , Hubert Ritzdorf1 , Mario Lucic1 , Vincent Lenders2 , and Srdjan Capkun1 1

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2016-11-01 06:37:08
6Information theory / Statistical theory / Mathematics / Mathematical analysis / Entropy / Mutual information / Expected value / Confidence interval / Information flow / Binomial distribution / Conditional entropy / Quantities of information

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
7Information theory / Metaphysics / Physics / Information / Information flow / Entropy / Leakage / Mutual information

Computing and Estimating Information Leakage with a Quantitative Point-to-Point Information Flow Model by

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
8

Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, and Alexandra Weber Computer Science De

Add to Reading List

Source URL: www.mais.informatik.tu-darmstadt.de

Language: English - Date: 2018-02-22 05:33:27
    9

    Work-in-Progress: RWS – A Roulette Wheel Scheduler for Preventing Execution Pattern Leakage Ying Zhang, Lingxiang Wang, Wei Jiang, Zhishan Guo Department of Computer Science, Missouri S&T Presenter: Zheng Dong*

    Add to Reading List

    Source URL: 2018.rtas.org

    Language: English - Date: 2018-05-06 16:29:41
      10

      Reducing Gate-Driven Leakage in 2D Semiconductors: Two-dimensional materials such as graphene and MoS2 have a wide range of bandgaps and effective masses, making them suitable for many different applications including m

      Add to Reading List

      Source URL: btbmarketing.com

      Language: English - Date: 2017-10-16 22:17:26
        UPDATE