Leakage

Results: 1395



#Item
111

NEW! Now with zero leakage – in combination with “SHR”* premium soft seal* (up to +200°C) Safe Variable & safe – in more than 35,000 variations!

Add to Reading List

Source URL: www.ari-armaturen.com

Language: English - Date: 2015-09-07 07:20:02
    112

    Deep-Secure Guard and Assuria Log Manager The Deep-Secure XML Guard enforces the constraints necessary to protect XML applications, combats XML-borne targeted cyber-attacks and guards against data leakage and exfiltratio

    Add to Reading List

    Source URL: www.deep-secure.com

    Language: English - Date: 2015-06-01 11:43:25
      113

      Leakage-resilient Stream Ciphers: an Overview Olivier Pereira∗ ICTEAM – Crypto Group Universit´e catholique de Louvain B-1348 Louvain-la-Neuve – Belgium March 10, 2011

      Add to Reading List

      Source URL: www.uclouvain.be

      Language: English - Date: 2011-12-14 05:30:34
        114

        Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Thomas Ristenpart∗ ∗

        Add to Reading List

        Source URL: rist.tech.cornell.edu

        Language: English - Date: 2015-07-13 21:30:11
          115

          How to Certify the Leakage of a Chip? F. Durvaux, F.-X. Standaert, N. Veyrat-Charvillon UCL Crypto Group, Belgium EUROCRYPT 2014, Copenhagen, Denmark

          Add to Reading List

          Source URL: ec14.compute.dtu.dk

          Language: English - Date: 2014-05-16 06:54:28
            116

            Carbon leakage myth buster Carbon Market Watch Policy Briefing October 2015 Executive summary The current EU ETS rules have granted preferential treatment to industrial companies deemed at risk of “carbon leakage”

            Add to Reading List

            Source URL: carbonmarketwatch.org

            Language: English - Date: 2015-10-06 14:01:47
              117

              Leakage-Aware Energy Synchronization for Wireless Sensor Networks Ting Zhu, Ziguo Zhong, Yu Gu, Tian He and Zhi-Li Zhang Department of Computer Science and Engineering, University of Minnesota {tzhu, zhong, yugu, tianhe,

              Add to Reading List

              Source URL: www-users.cs.umn.edu

              Language: English - Date: 2009-07-03 20:48:40
                118

                ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, and Wenke Lee School of Computer Science, Georgia Institute of Technology

                Add to Reading List

                Source URL: wenke.gtisc.gatech.edu

                Language: English - Date: 2015-09-04 21:45:19
                  UPDATE