Results 31 to 40 of about 1,857,403 (288)

Joint Source-Channel Coding on a Multiple Access Channel with Side Information

open access: yes, 2009
We consider the problem of transmission of several distributed correlated sources over a multiple access channel (MAC) with side information at the sources and the decoder. Source-channel separation does not hold for this channel.
Rajesh, R.   +2 more
core   +1 more source

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

Аналітичний огляд та аналіз трендів вразливості RowHummer для різних виробників DRAM

open access: yesSocial Development & Security
Мета роботи: провести аналітичний огляд вразливості жорстких дисків типу SSD та проаналізувати трендів вразливості RowHummer для різних виробників DRAM. Сформувати прогнози розвитку.
Valentyn Mazurok, Vladimir Lutsenko
doaj   +1 more source

Capacity of Coded Index Modulation

open access: yes, 2015
We consider the special case of index coding over the Gaussian broadcast channel where each receiver has prior knowledge of a subset of messages at the transmitter and demands all the messages from the source.
Hong, Yi   +2 more
core   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths

open access: yesCryptography
As more network communication is encrypted to provide data privacy for users, attackers are focusing their attention on traffic analysis methods for side-channel attacks on user privacy.
Gregor Tamati Haywood   +1 more
doaj   +1 more source

Numerical simulation of hydro-and morfodynamic effects of side channels design parameters [PDF]

open access: yes, 2012
Four side channel design parameters are analysed by two-dimensionally modelling the extremes with the numerical software package Delft3D. In order to advise how to minimise the maintenance activity dredging in rivers due to the construction of side ...
Schuurman, P.K.
core   +1 more source

Private Colleges, State Aid, and the Establishment Clause [PDF]

open access: yes, 1975
Using local scanning electrical techniques we study edge effects in side-gated Hall bar nanodevices made of epitaxial graphene. We demonstrate that lithographically defined edges of the graphene channel exhibit hole conduction within the narrow band of ...
Kazakova, Olga   +5 more
core   +3 more sources

Side Channel Attacks

open access: yes, 2011
This chapter presents the main Side-Channel Attacks, a kind of hardware cryptanalytic techniques which exploits the physical behavior of an IC to extract secrets implied in cryptographic operations. We show in this chapter the main modern concepts about Side Channel Attacks (Simple and Differential Power Analysis) and how they can be deployed on FPGA ...
Lomné, Victor   +4 more
openaire   +2 more sources

Side-channel indistinguishability [PDF]

open access: yesProceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 2013
We introduce a masking strategy for hardware that prevents any side-channel attacker from recovering uniquely the secret key of a cryptographic device. In this masking scheme, termed homomorphic, the sensitive data is exclusive-ored with a random value that belongs to a given set. We show that if this masking set is concealed, then no information about
Claude Carlet, Sylvain Guilley
openaire   +1 more source

Home - About - Disclaimer - Privacy