Leakage

Results: 1395



#Item
11Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks Boris K¨opf MPI-SWS

Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks Boris K¨opf MPI-SWS

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2010-09-02 11:11:48
    12Faster Two-Bit Pattern Analysis of Leakage Ziyuan Meng and Geoffrey Smith School of Computing and Information Sciences Florida International University, Miami, FL 33199, USA ,

    Faster Two-Bit Pattern Analysis of Leakage Ziyuan Meng and Geoffrey Smith School of Computing and Information Sciences Florida International University, Miami, FL 33199, USA ,

    Add to Reading List

    Source URL: users.cis.fiu.edu

    Language: English - Date: 2013-09-06 08:58:19
      13Evaluation of the report by Tokyo Electric Power Company regarding the leakage from piping transferring water treated at the Multi-nuclide Removal System (ALPS) at the Fukushima Daiichi Nuclear Power Station Nuclear Regu

      Evaluation of the report by Tokyo Electric Power Company regarding the leakage from piping transferring water treated at the Multi-nuclide Removal System (ALPS) at the Fukushima Daiichi Nuclear Power Station Nuclear Regu

      Add to Reading List

      Source URL: www.nsr.go.jp

      Language: English - Date: 2016-03-31 20:36:00
        14Evaluation of the report of Tokyo Electric Power Company regarding the leakage from the 4000-t square steel tank cluster at the Fukushima Daiichi Nuclear Power Station 28 April 2015 Nuclear Regulation Authority, Japan 1.

        Evaluation of the report of Tokyo Electric Power Company regarding the leakage from the 4000-t square steel tank cluster at the Fukushima Daiichi Nuclear Power Station 28 April 2015 Nuclear Regulation Authority, Japan 1.

        Add to Reading List

        Source URL: www.nsr.go.jp

        Language: English - Date: 2015-08-19 22:59:21
          15Proceedings on Privacy Enhancing Technologies 2015; ):77–91  Vasile C. Perta*, Marco V. Barbera, Gareth Tyson, Hamed Haddadi1 , and Alessandro Mei2 A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hi

          Proceedings on Privacy Enhancing Technologies 2015; ):77–91 Vasile C. Perta*, Marco V. Barbera, Gareth Tyson, Hamed Haddadi1 , and Alessandro Mei2 A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hi

          Add to Reading List

          Source URL: www.petsymposium.org

          Language: English - Date: 2015-06-23 15:36:19
            16Microsoft Word - RSD Leakage_MOSAIC.doc

            Microsoft Word - RSD Leakage_MOSAIC.doc

            Add to Reading List

            Source URL: www.asheboronc.gov

            Language: English - Date: 2014-03-31 14:24:13
              17Calculating Bounds on Information Leakage Using Two-Bit Patterns Ziyuan Meng Geoffrey Smith

              Calculating Bounds on Information Leakage Using Two-Bit Patterns Ziyuan Meng Geoffrey Smith

              Add to Reading List

              Source URL: users.cis.fiu.edu

              Language: English - Date: 2011-10-24 09:10:14
                18Duct Leakage Test Results (Existing Construction) Permit #: ___________________________ House address or lot number: ______________________________________________ City: _______________________  Zip: ___________________

                Duct Leakage Test Results (Existing Construction) Permit #: ___________________________ House address or lot number: ______________________________________________ City: _______________________ Zip: ___________________

                Add to Reading List

                Source URL: www.energy.wsu.edu

                Language: English - Date: 2013-05-20 14:46:21
                  192016 IEEE 29th Computer Security Foundations Symposium  Axioms for Information Leakage M´ario S. Alvim∗ Carroll Morgan§ ∗

                  2016 IEEE 29th Computer Security Foundations Symposium Axioms for Information Leakage M´ario S. Alvim∗ Carroll Morgan§ ∗

                  Add to Reading List

                  Source URL: users.cis.fiu.edu

                  Language: English - Date: 2017-08-28 11:59:30
                    20Quantitative Information Leakage Lecture 10 1

                    Quantitative Information Leakage Lecture 10 1

                    Add to Reading List

                    Source URL: www.lix.polytechnique.fr

                    Language: English - Date: 2016-04-26 01:57:24