Results 71 to 80 of about 212,817 (301)
Task Parameters Analysis in Schedule-Based Timing Side-Channel Attack
Recent work has shown that the timing behavior of a real-time system can be utilized by attackers for various adverse purposes via schedule-based timing side-channel attacks.
Songran Liu, Wang Yi
doaj +1 more source
Duplex Stainless Steel Laser‐Surface Textured: Stability in Brine Solution
Controlled laser‐surface treatment (LST) of duplex DSS2205 steel is performed to increase its stability in brine solution under cyclic electrochemical assays. The superior protection with respect to flat and smooth panels is attributed to the presence of FeCr2O4 as the main protective oxide layer in the LST surface, after corrosion tests. The stability
Mohammad Rezayat +5 more
wiley +1 more source
It is shown that laser ablation pretreatment under oxygen‐free conditions enables copper–aluminium bonding at significantly lower deformation degrees and improved properties compared to mechanical brushing. Laser ablation further increases interface contact area and induces favourable residual stress states and microstructural compatibility ...
Khemais Barienti +11 more
wiley +1 more source
Carbon nanomaterial‐reinforced epoxy composites exhibit pronounced piezoresistive behavior, enabling intrinsic damage sensing under cyclic and fatigue loading. This review critically compares carbon nanotube and graphene systems, correlating filler content, percolation threshold, and gauge factor with sensing stability and damage evolution.
J. M. Parente +3 more
wiley +1 more source
Near Collision Side Channel Attacks [PDF]
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar
Barış Ege +2 more
openaire +1 more source
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries
Operating systems use shared memory to improve performance. However, as shown in recent studies, attackers can exploit CPU cache side-channels associated with shared memory to extract sensitive information.
Daimeng Wang +6 more
semanticscholar +1 more source
Electrical Conductivities of Conductors, Semiconductors, and Their Mixtures at Elevated Temperatures
This article presents a comprehensive review of temperature‐dependent electrical conductivity data for multiple material classes at elevated temperatures, highlighting a persistent conductivity gap between metals and semiconductors in the range of 102$\left(10\right)^{2}$– 107$\left(10\right)^{7}$ S/m. Metal–ceramic irregular metamaterials are proposed
Valentina Torres Nieto, Marcia A. Cooper
wiley +1 more source
ASNI: Attenuated Signature Noise Injection for Low-Overhead Power Side-Channel Attack Immunity
Computationally-secure cryptographic algorithms implemented on a physical platform leak significant “side-channel” information through their power supplies.
Debayan Das +5 more
semanticscholar +1 more source
Fungal mycelia grown into biodegradable scaffolds and infused with titania nanoparticles show enhanced ultraviolet shielding, thermal protection, and surface nonwettability. Properties were tuned by drying methods, revealing structure–function relationships.
Juwon S. Afolayan +2 more
wiley +1 more source
This work explores Li‐substituted P2 layered oxides for Na‐ion batteries by crystallographic and electrochemical studies. The effect of lithium on superstructure orderings, on phase transitions during synthesis and electrochemical cycling and on the interplay of O‐ versus TM‐redox is revealed via various advanced techniques, including semi‐simultaneous
Mingfeng Xu +5 more
wiley +1 more source

