Results 211 to 220 of about 27,981 (260)
Delta wing design in earliest nektonic vertebrates. [PDF]
Botella H, Fariña RA, Huera-Huarte F.
europepmc +1 more source
Isolated Uhthoff phenomenon as first manifestation of multiple sclerosis: a case report. [PDF]
Löffler A+4 more
europepmc +1 more source
Dynamic fluctuations in brain iron content during migraine attacks: insights from relaxometry and diffusion tensor imaging. [PDF]
Birkl C+6 more
europepmc +1 more source
Underwater Wavelength Attack on Discrete Modulated Continuous-Variable Quantum Key Distribution. [PDF]
Feng K+5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Transactions on Dependable and Secure Computing, 2020
Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used to accelerate data intensive workloads.
Hoda Naghibijouybari+3 more
openaire +2 more sources
Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used to accelerate data intensive workloads.
Hoda Naghibijouybari+3 more
openaire +2 more sources
On the Detection of Side-Channel Attacks
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), 2018Threats posed by side-channel and covert-channel attacks exploiting the CPU cache to compromise the confidentiality of a system raise serious security concerns. This applies especially to systems offering shared hardware or resources to their customers.
Vateva-Gurova, T., Suri, Neeraj
openaire +2 more sources
Timing and Side Channel Attacks
2015How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area.
Amit Resh, Nezer Jacob Zaidenberg
openaire +2 more sources
Thwarting side-channel attacks
Communications of the ACM, 2020Deep learning challenges chip security.
openaire +2 more sources
2007 44th ACM/IEEE Design Automation Conference, 2007
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire +2 more sources
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire +2 more sources