Leakage

Results: 1395



#Item
41Media Scanner for Data Protection—Websites TM Data leakage results in lost revenue and privacy violations Occurring with greater and greater frequency, data leakage is the collection of your valuable first-party data b

Media Scanner for Data Protection—Websites TM Data leakage results in lost revenue and privacy violations Occurring with greater and greater frequency, data leakage is the collection of your valuable first-party data b

Add to Reading List

Source URL: www.themediatrust.com

- Date: 2016-01-14 12:07:11
    42Public-Key Cryptosystems Resilient to Key Leakage Moni Naor∗ Gil Segev†  Abstract

    Public-Key Cryptosystems Resilient to Key Leakage Moni Naor∗ Gil Segev† Abstract

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2012-05-30 13:55:48
      43Fully Leakage-Resilient Signatures Elette Boyle∗ Gil Segev†  Daniel Wichs‡

      Fully Leakage-Resilient Signatures Elette Boyle∗ Gil Segev† Daniel Wichs‡

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2012-10-07 22:37:50
        44After-the-Fact Leakage in Public-Key Encryption Huijia Lin∗ Cornell University Shai Halevi IBM Research

        After-the-Fact Leakage in Public-Key Encryption Huijia Lin∗ Cornell University Shai Halevi IBM Research

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2011-01-06 01:53:57
          45Efficient Public-Key Cryptography in the Presence of Key Leakage Yevgeniy Dodis∗ Kristiyan Haralambiev †  Adriana L´opez-Alt ‡

          Efficient Public-Key Cryptography in the Presence of Key Leakage Yevgeniy Dodis∗ Kristiyan Haralambiev † Adriana L´opez-Alt ‡

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2010-09-15 14:13:14
            46Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette1 , Kevin Lewi2 , Stephen A. Weis3 , and David J. Wu2 1 Rose-Hulman Institute of Technology 2

            Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette1 , Kevin Lewi2 , Stephen A. Weis3 , and David J. Wu2 1 Rose-Hulman Institute of Technology 2

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-02-05 16:46:30
              47Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette1 , Kevin Lewi2 , Stephen A. Weis3 , and David J. Wu2 1 Rose-Hulman Institute of Technology 2

              Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette1 , Kevin Lewi2 , Stephen A. Weis3 , and David J. Wu2 1 Rose-Hulman Institute of Technology 2

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-02-05 16:46:30
                48LEAKAGE CLAMP METER  DCL460F APPLICATIONS AND FEATURES  This meter is useful for measuring leakage or

                LEAKAGE CLAMP METER DCL460F APPLICATIONS AND FEATURES This meter is useful for measuring leakage or

                Add to Reading List

                Source URL: www.sanwa-meter.co.jp

                - Date: 2015-09-04 00:02:49
                  49Signatures Resilient to Continual Leakage on Memory and Computation Tal Malkin∗ Isamu Teranishi†

                  Signatures Resilient to Continual Leakage on Memory and Computation Tal Malkin∗ Isamu Teranishi†

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2010-10-09 09:51:54
                    50Cryptography Resilient to Continual Memory Leakage Zvika Brakerski∗ Yael Tauman Kalai†  Jonathan Katz‡

                    Cryptography Resilient to Continual Memory Leakage Zvika Brakerski∗ Yael Tauman Kalai† Jonathan Katz‡

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2010-05-11 17:26:42