Artículos de revistas sobre el tema "Side channels attacks"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Side channels attacks".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Mostovoy, R. A., A. B. Levina, D. M. Sleptsova y P. S. Borisenko. "SIDE-CHANNEL ATTACKS ON THE MOBILE PHONES". Vestnik komp'iuternykh i informatsionnykh tekhnologii, n.º 186 (diciembre de 2019): 46–53. http://dx.doi.org/10.14489/vkit.2019.12.pp.046-053.
Texto completoBrotzman, Robert, Danfeng Zhang, Mahmut Taylan Kandemir y Gang Tan. "SpecSafe: detecting cache side channels in a speculative world". Proceedings of the ACM on Programming Languages 5, OOPSLA (20 de octubre de 2021): 1–28. http://dx.doi.org/10.1145/3485506.
Texto completoBoroda, Anatoly y Taras Petrenko. "IMPACT OF ATTACKS THROUGH SIDE CHANNELS ON INFORMATION SECURITY". TECHNICAL SCIENCES AND TECHNOLOGIES, n.º 4(34) (2023): 91–103. http://dx.doi.org/10.25140/2411-5363-2023-4(34)-91-103.
Texto completoLou, Xiaoxuan, Tianwei Zhang, Jun Jiang y Yinqian Zhang. "A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography". ACM Computing Surveys 54, n.º 6 (julio de 2021): 1–37. http://dx.doi.org/10.1145/3456629.
Texto completoSu, Chao y Qingkai Zeng. "Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures". Security and Communication Networks 2021 (10 de junio de 2021): 1–15. http://dx.doi.org/10.1155/2021/5559552.
Texto completoAttah, Amankwah. "Mitigating Electromagnetic Side-Channel Attacks". Advances in Multidisciplinary and scientific Research Journal Publication 1, n.º 1 (20 de julio de 2022): 71–76. http://dx.doi.org/10.22624/aims/crp-bk3-p12.
Texto completoDerevianko, Ya A. y I. D. Gorbenko. "FALCON signature vulnerability to special attacks and its protection". Radiotekhnika, n.º 210 (28 de septiembre de 2022): 37–52. http://dx.doi.org/10.30837/rt.2022.3.210.03.
Texto completoAlexander, Geoffrey, Antonio M. Espinoza y Jedidiah R. Crandall. "Detecting TCP/IP Connections via IPID Hash Collisions". Proceedings on Privacy Enhancing Technologies 2019, n.º 4 (1 de octubre de 2019): 311–28. http://dx.doi.org/10.2478/popets-2019-0071.
Texto completoBache, Florian, Christina Plump, Jonas Wloka, Tim Güneysu y Rolf Drechsler. "Evaluation of (power) side-channels in cryptographic implementations". it - Information Technology 61, n.º 1 (25 de febrero de 2019): 15–28. http://dx.doi.org/10.1515/itit-2018-0028.
Texto completoZhang, Xiaojuan, Yayun Zhu, Baiji Hu, Jingyi Cao y Ziqing Lin. "A Novel Power System Side Channel Attack Method Based on Machine Learning CNN-Transformer". Journal of Physics: Conference Series 2615, n.º 1 (1 de octubre de 2023): 012011. http://dx.doi.org/10.1088/1742-6596/2615/1/012011.
Texto completoAydin, Furkan, Aydin Aysu, Mohit Tiwari, Andreas Gerstlauer y Michael Orshansky. "Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols". ACM Transactions on Embedded Computing Systems 20, n.º 6 (30 de noviembre de 2021): 1–22. http://dx.doi.org/10.1145/3476799.
Texto completoGnanavel, S., K. E. Narayana, K. Jayashree, P. Nancy y Dawit Mamiru Teressa. "Implementation of Block-Level Double Encryption Based on Machine Learning Techniques for Attack Detection and Prevention". Wireless Communications and Mobile Computing 2022 (9 de julio de 2022): 1–9. http://dx.doi.org/10.1155/2022/4255220.
Texto completoWu, Dehua, Wan’ang Xiao, Shan Gao y Wanlin Gao. "A novel cache based on dynamic mapping against speculative execution attacks". MATEC Web of Conferences 355 (2022): 03054. http://dx.doi.org/10.1051/matecconf/202235503054.
Texto completoAlbalawi, Abdullah. "On Preventing and Mitigating Cache Based Side-Channel Attacks on AES System in Virtualized Environments". Computer and Information Science 17, n.º 1 (27 de febrero de 2024): 9. http://dx.doi.org/10.5539/cis.v17n1p9.
Texto completoMa, Cong, Dinghao Wu, Gang Tan, Mahmut Taylan Kandemir y Danfeng Zhang. "Quantifying and Mitigating Cache Side Channel Leakage with Differential Set". Proceedings of the ACM on Programming Languages 7, OOPSLA2 (16 de octubre de 2023): 1470–98. http://dx.doi.org/10.1145/3622850.
Texto completoHe, Jiaji, Xiaolong Guo, Mark Tehranipoor, Apostol Vassilev y Yier Jin. "EM Side Channels in Hardware Security: Attacks and Defenses". IEEE Design & Test 39, n.º 2 (abril de 2022): 100–111. http://dx.doi.org/10.1109/mdat.2021.3135324.
Texto completoJayasinghe, Darshana, Aleksandar Ignjatovic, Roshan Ragel, Jude Angelo Ambrose y Sri Parameswaran. "QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks". ACM Transactions on Design Automation of Electronic Systems 26, n.º 5 (5 de junio de 2021): 1–36. http://dx.doi.org/10.1145/3443706.
Texto completoSoares, Rafael I., Ney L. V. Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine y Lionel Torres. "A GALS Pipeline DES Architecture to Increase Robustness against CPA and CEMA Attacks". Journal of Integrated Circuits and Systems 6, n.º 1 (27 de diciembre de 2011): 25–34. http://dx.doi.org/10.29292/jics.v6i1.335.
Texto completoSzefer, Jakub. "Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses". Journal of Hardware and Systems Security 3, n.º 3 (13 de septiembre de 2018): 219–34. http://dx.doi.org/10.1007/s41635-018-0046-1.
Texto completoGruss, Daniel. "Software-based microarchitectural attacks". it - Information Technology 60, n.º 5-6 (19 de diciembre de 2018): 335–41. http://dx.doi.org/10.1515/itit-2018-0034.
Texto completoTerauchi, Tachio y Timos Antonopoulos. "Bucketing and information flow analysis for provable timing attack mitigation". Journal of Computer Security 28, n.º 6 (27 de noviembre de 2020): 607–34. http://dx.doi.org/10.3233/jcs-191356.
Texto completoTian, Jing, Gang Xiong, Zhen Li y Gaopeng Gou. "A Survey of Key Technologies for Constructing Network Covert Channel". Security and Communication Networks 2020 (5 de agosto de 2020): 1–20. http://dx.doi.org/10.1155/2020/8892896.
Texto completoSantoso, Bagus y Yasutada Oohama. "Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †". Entropy 21, n.º 8 (9 de agosto de 2019): 781. http://dx.doi.org/10.3390/e21080781.
Texto completoSalomon, Dor, Amir Weiss y Itamar Levi. "Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis". Cryptography 5, n.º 3 (13 de septiembre de 2021): 24. http://dx.doi.org/10.3390/cryptography5030024.
Texto completoAl-Eidi, Shorouq, Omar Darwish y Yuanzhu Chen. "Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications". Sensors 20, n.º 8 (24 de abril de 2020): 2417. http://dx.doi.org/10.3390/s20082417.
Texto completoJia, Hefei, Xu Liu, Xiaoqiang Di, Hui Qi, Binbin Cai, Jinqing Li, Huamin Yang y Jianping Zhao. "A Secure Virtual Machine Allocation Strategy Against Co-Resident Attacks". Journal of Advanced Computational Intelligence and Intelligent Informatics 23, n.º 5 (20 de septiembre de 2019): 898–908. http://dx.doi.org/10.20965/jaciii.2019.p0898.
Texto completoMolotkov, S. N. "Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography". Journal of Experimental and Theoretical Physics 130, n.º 6 (junio de 2020): 809–32. http://dx.doi.org/10.1134/s1063776120050064.
Texto completoZoughbi, Dina Mohsen y Nitul Dutta. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment". International Journal of Innovative Technology and Exploring Engineering 10, n.º 2 (10 de diciembre de 2020): 42–48. http://dx.doi.org/10.35940/ijitee.b8262.1210220.
Texto completoMolotkov, S. N. y A. A. Shcherbachenko. "On the Robustness of Reference-Frame-Independent Quantum Key Distribution Systems Against Active Probing Attacks". JETP Letters 119, n.º 5 (marzo de 2024): 402–12. http://dx.doi.org/10.1134/s0021364024600216.
Texto completoBabukhin, D. y D. Sych. "Explicit attacks on passive side channels of the light source in the BB84 decoy state protocol". Journal of Physics: Conference Series 1984, n.º 1 (1 de julio de 2021): 012008. http://dx.doi.org/10.1088/1742-6596/1984/1/012008.
Texto completoCabodi, Gianpiero, Paolo Camurati, Fabrizio Finocchiaro y Danilo Vendraminetto. "Model-Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification". Electronics 8, n.º 9 (19 de septiembre de 2019): 1057. http://dx.doi.org/10.3390/electronics8091057.
Texto completoMishra, Nimish, Kuheli Pratihar, Satota Mandal, Anirban Chakraborty, Ulrich Rührmair y Debdeep Mukhopadhyay. "CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 1 (4 de diciembre de 2023): 501–26. http://dx.doi.org/10.46586/tches.v2024.i1.501-526.
Texto completoRepka, Marek y Pavol Zajac. "Overview of the Mceliece Cryptosystem and its Security". Tatra Mountains Mathematical Publications 60, n.º 1 (1 de septiembre de 2014): 57–83. http://dx.doi.org/10.2478/tmmp-2014-0025.
Texto completoYesina, Maryna y Ivan Gorbenko. "Substantiation of requirements and ways of their realization at synthesis of proof-stable perspective electronic signatures". Physico-mathematical modelling and informational technologies, n.º 32 (8 de julio de 2021): 116–20. http://dx.doi.org/10.15407/fmmit2021.32.116.
Texto completoTatarnikova, Tatiyana. "Restricting data leakage through non-obvious features of Android 5 smartphone". Information and Control Systems, n.º 5 (16 de octubre de 2019): 24–29. http://dx.doi.org/10.31799/1684-8853-2019-5-24-29.
Texto completoFischer, Andreas, Benny Fuhry, Florian Kerschbaum y Eric Bodden. "Computation on Encrypted Data using Dataflow Authentication". Proceedings on Privacy Enhancing Technologies 2020, n.º 1 (1 de enero de 2020): 5–25. http://dx.doi.org/10.2478/popets-2020-0002.
Texto completoGnad, Dennis R. E., Cong Dang Khoa Nguyen, Syed Hashim Gillani y Mehdi B. Tahoori. "Voltage-Based Covert Channels Using FPGAs". ACM Transactions on Design Automation of Electronic Systems 26, n.º 6 (28 de junio de 2021): 1–25. http://dx.doi.org/10.1145/3460229.
Texto completoFischer, Andreas, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum y Eric Bodden. "Computation on Encrypted Data Using Dataflow Authentication". ACM Transactions on Privacy and Security 25, n.º 3 (31 de agosto de 2022): 1–36. http://dx.doi.org/10.1145/3513005.
Texto completoMaji, Saurav, Utsav Banerjee y Anantha P. Chandrakasan. "Leaky Nets: Recovering Embedded Neural Network Models and Inputs Through Simple Power and Timing Side-Channels—Attacks and Defenses". IEEE Internet of Things Journal 8, n.º 15 (1 de agosto de 2021): 12079–92. http://dx.doi.org/10.1109/jiot.2021.3061314.
Texto completoWang, Xingyu, Wei Liu, Tianyi Wu, Chang Guo, Yijun Zhang, Shanghong Zhao y Chen Dong. "Free Space Measurement Device Independent Quantum Key Distribution with Modulating Retro-Reflectors under Correlated Turbulent Channel". Entropy 23, n.º 10 (1 de octubre de 2021): 1299. http://dx.doi.org/10.3390/e23101299.
Texto completoAinapure, Bharati, Deven Shah y A. Ananda Rao. "Adaptive multilevel fuzzy-based authentication framework to mitigate Cache side channel attack in cloud computing". International Journal of Modeling, Simulation, and Scientific Computing 09, n.º 05 (octubre de 2018): 1850045. http://dx.doi.org/10.1142/s1793962318500459.
Texto completoErata, Ferhat, Chuanqi Xu, Ruzica Piskac y Jakub Szefer. "Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 2 (12 de marzo de 2024): 735–68. http://dx.doi.org/10.46586/tches.v2024.i2.735-768.
Texto completoFranzoni, Federico, Xavier Salleras y Vanesa Daza. "AToM: Active topology monitoring for the bitcoin peer-to-peer network". Peer-to-Peer Networking and Applications 15, n.º 1 (14 de octubre de 2021): 408–25. http://dx.doi.org/10.1007/s12083-021-01201-7.
Texto completoSauvage, Laurent, Sylvain Guilley, Florent Flament, Jean-Luc Danger y Yves Mathieu. "Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography". International Journal of Reconfigurable Computing 2012 (2012): 1–9. http://dx.doi.org/10.1155/2012/360242.
Texto completoHaehyun Cho. "A Systematic Study on Spectre Attacks and Defenses". Research Briefs on Information and Communication Technology Evolution 7 (30 de noviembre de 2021): 197–203. http://dx.doi.org/10.56801/rebicte.v7i.129.
Texto completoAbduljabbar, Zaid Ameen, Vincent Omollo Nyangaresi, Hend Muslim Jasim, Junchao Ma, Mohammed Abdulridha Hussain, Zaid Alaa Hussien y Abdulla J. Y. Aldarwish. "Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture". Sustainability 15, n.º 13 (28 de junio de 2023): 10264. http://dx.doi.org/10.3390/su151310264.
Texto completoShepherd, Michael, Scott Brookes y Robert Denz. "Transient Execution and Side Channel Analysis: a Vulnerability or a Science Experiment?" International Conference on Cyber Warfare and Security 17, n.º 1 (2 de marzo de 2022): 288–97. http://dx.doi.org/10.34190/iccws.17.1.20.
Texto completoZhang, Qi, An Wang, Yongchuan Niu, Ning Shang, Rixin Xu, Guoshuang Zhang y Liehuang Zhu. "Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9". Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/9701756.
Texto completoTran, Ngoc Quy y Hong Quang Nguyen. "EFFICIENT CNN-BASED PROFILED SIDE CHANNEL ATTACKS". Journal of Computer Science and Cybernetics 37, n.º 1 (29 de marzo de 2021): 1–22. http://dx.doi.org/10.15625/1813-9663/37/1/15418.
Texto completoZhou, Ziqiao y Michael K. Reiter. "Interpretable noninterference measurement and its application to processor designs". Proceedings of the ACM on Programming Languages 5, OOPSLA (20 de octubre de 2021): 1–30. http://dx.doi.org/10.1145/3485518.
Texto completo