Results 211 to 220 of about 27,981 (260)

Delta wing design in earliest nektonic vertebrates. [PDF]

open access: yesCommun Biol
Botella H, Fariña RA, Huera-Huarte F.
europepmc   +1 more source

Isolated Uhthoff phenomenon as first manifestation of multiple sclerosis: a case report. [PDF]

open access: yesBMC Neurol
Löffler A   +4 more
europepmc   +1 more source

Dynamic fluctuations in brain iron content during migraine attacks: insights from relaxometry and diffusion tensor imaging. [PDF]

open access: yesFront Neurol
Birkl C   +6 more
europepmc   +1 more source

Side Channel Attacks on GPUs

IEEE Transactions on Dependable and Secure Computing, 2020
Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used to accelerate data intensive workloads.
Hoda Naghibijouybari   +3 more
openaire   +2 more sources

On the Detection of Side-Channel Attacks

2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), 2018
Threats posed by side-channel and covert-channel attacks exploiting the CPU cache to compromise the confidentiality of a system raise serious security concerns. This applies especially to systems offering shared hardware or resources to their customers.
Vateva-Gurova, T., Suri, Neeraj
openaire   +2 more sources

Timing and Side Channel Attacks

2015
How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area.
Amit Resh, Nezer Jacob Zaidenberg
openaire   +2 more sources

Thwarting side-channel attacks

Communications of the ACM, 2020
Deep learning challenges chip security.
openaire   +2 more sources

Side-Channel Attack Pitfalls

2007 44th ACM/IEEE Design Automation Conference, 2007
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy