Search results
Jump to navigation
Jump to search
- |Field=hardware security, security, IOT, side channel attacks435 bytes (53 words) - 13:37, 17 February 2021
- Side Channel Attacks and Countermeasures2 KB (169 words) - 14:09, 17 February 2021
- * Architectural support for security, side-channel attacks and mitigation, privacy preserving computation, IoT/Cloud/Cyber-Physical-Sy4 KB (457 words) - 14:02, 17 February 2021
- * Channel modeling and estimation * Joint source-channel coding for wireless communications14 KB (1,518 words) - 12:57, 17 February 2021
- * Architectural support for security, side-channel attacks and mitigation, privacy preserving computation, IoT/Cloud/Cyber-Physical-Sy5 KB (580 words) - 14:03, 17 February 2021
- * 13.3. Side-channel attacks, fault attacks and countermeasures6 KB (739 words) - 14:02, 17 February 2021
- ...are-security circuits including PUFs, TRNGs, crypto-circuits, side-channel-attacks mitigation.5 KB (629 words) - 14:02, 17 February 2021
- ...eudo-anonymity; Mitigating threats; Privilege control and isolation; Cyber-attacks and human factors; IoT and big data security issues; Privacy and protection ...information; Vulnerability analysis and countermeasures; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse15 KB (1,886 words) - 14:09, 17 February 2021
- * Side-channel attacks10 KB (1,270 words) - 13:10, 17 February 2021
- * Side-channel attacks16 KB (2,178 words) - 12:58, 17 February 2021