Security Through Amnesia: A Software-Based Solution to the Cold Boot Attack on Disk Encryption [PDF]
Disk encryption has become an important security measure for a multitude of clients, including governments, corporations, activists, security-conscious professionals, and privacy-conscious individuals.
Simmons, Patrick
core +1 more source
Mitigating Timing Side-Channel Attacks in Software-Defined Networks: Detection and Response [PDF]
Faizan Shoaib +3 more
openalex +1 more source
Glyphosate (GLY) and its primary metabolite, aminomethylphosphonic acid (AMPA), are photodegraded using a poly(vinylidene fluoride) membrane with immobilized titanium dioxide (PVDF‐TiO2) in a continuous flow‐through operation under solar light. At optimized conditions, the PVDF‐TiO2 membrane achieved 95% GLY and 80% AMPA removal with •O2− as the ...
Phuong B. Trinh +4 more
wiley +1 more source
Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack. [PDF]
Nassiri Abrishamchi MA +4 more
europepmc +1 more source
Side-Channel Attacks on Masked Bitsliced Implementations of AES [PDF]
Anca Rǎdulescu, Omar Choudary
openalex +1 more source
Backbone Heterojunction Photocatalysts for Efficient Sacrificial Hydrogen Production
Herein, a ‘single‐component’ organic semiconductor photocatalyst is presented in which a molecular donor is bonded to a polymer acceptor. The resultant material demonstrates exceptional photocatalytic activity for hydrogen evolution in aqueous triethylamine with an outstanding external quantum efficiency of 38% at 420 nm.
Richard J. Lyons +11 more
wiley +1 more source
Reevaluating the Activity of ZIF‐8 Based FeNCs for Electrochemical Ammonia Production
Though receiving much attention, the field of electrochemical nitrogen reduction reaction (eNRR) to ammonia is marked by doubts about whether this reaction is possible in aqueous media. This work sheds light on this question for iron single‐atom on N‐doped carbon (FeNC) catalysts—a class of well‐known catalysts that is also worth testing for the sister
Caroline Schneider +6 more
wiley +1 more source
Measurement of heat transfer and pressure drop in rectangular channels with turbulence promoters [PDF]
Periodic rib turbulators were used in advanced turbine cooling designs to enhance the internal heat transfer. The objective of the present project was to investigate the combined effects of the rib angle of attack and the channel aspect ratio on the ...
Han, J. C., Ibrahim, M. Y., Park, J. S.
core +1 more source
Side-Channel Attacks Meet Secure Network Protocols [PDF]
Side-channel attacks are powerful tools for breaking systems that implement cryptographic algorithms. The Advanced Encryption Standard (AES) is widely used to secure data, including the communication within various network protocols. Major cryptographic libraries such as OpenSSL or ARM mbed TLS include at least one implementation of the AES.
Biryukov, Alex +2 more
openaire +2 more sources
SCADET: A Side-Channel Attack Detection Tool for Tracking Prime-Probe
Microarchitectural side-channel attacks have posed serious threats to many computing systems, ranging from embedded systems and mobile devices to desktop workstations and cloud servers.
M. Sabbagh, Yunsi Fei, T. Wahl, A. Ding
semanticscholar +1 more source

