Artykuły w czasopismach na temat „Side channels attacks”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Side channels attacks”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Mostovoy, R. A., A. B. Levina, D. M. Sleptsova i P. S. Borisenko. "SIDE-CHANNEL ATTACKS ON THE MOBILE PHONES". Vestnik komp'iuternykh i informatsionnykh tekhnologii, nr 186 (grudzień 2019): 46–53. http://dx.doi.org/10.14489/vkit.2019.12.pp.046-053.
Pełny tekst źródłaBrotzman, Robert, Danfeng Zhang, Mahmut Taylan Kandemir i Gang Tan. "SpecSafe: detecting cache side channels in a speculative world". Proceedings of the ACM on Programming Languages 5, OOPSLA (20.10.2021): 1–28. http://dx.doi.org/10.1145/3485506.
Pełny tekst źródłaBoroda, Anatoly, i Taras Petrenko. "IMPACT OF ATTACKS THROUGH SIDE CHANNELS ON INFORMATION SECURITY". TECHNICAL SCIENCES AND TECHNOLOGIES, nr 4(34) (2023): 91–103. http://dx.doi.org/10.25140/2411-5363-2023-4(34)-91-103.
Pełny tekst źródłaLou, Xiaoxuan, Tianwei Zhang, Jun Jiang i Yinqian Zhang. "A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography". ACM Computing Surveys 54, nr 6 (lipiec 2021): 1–37. http://dx.doi.org/10.1145/3456629.
Pełny tekst źródłaSu, Chao, i Qingkai Zeng. "Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures". Security and Communication Networks 2021 (10.06.2021): 1–15. http://dx.doi.org/10.1155/2021/5559552.
Pełny tekst źródłaAttah, Amankwah. "Mitigating Electromagnetic Side-Channel Attacks". Advances in Multidisciplinary and scientific Research Journal Publication 1, nr 1 (20.07.2022): 71–76. http://dx.doi.org/10.22624/aims/crp-bk3-p12.
Pełny tekst źródłaDerevianko, Ya A., i I. D. Gorbenko. "FALCON signature vulnerability to special attacks and its protection". Radiotekhnika, nr 210 (28.09.2022): 37–52. http://dx.doi.org/10.30837/rt.2022.3.210.03.
Pełny tekst źródłaAlexander, Geoffrey, Antonio M. Espinoza i Jedidiah R. Crandall. "Detecting TCP/IP Connections via IPID Hash Collisions". Proceedings on Privacy Enhancing Technologies 2019, nr 4 (1.10.2019): 311–28. http://dx.doi.org/10.2478/popets-2019-0071.
Pełny tekst źródłaBache, Florian, Christina Plump, Jonas Wloka, Tim Güneysu i Rolf Drechsler. "Evaluation of (power) side-channels in cryptographic implementations". it - Information Technology 61, nr 1 (25.02.2019): 15–28. http://dx.doi.org/10.1515/itit-2018-0028.
Pełny tekst źródłaZhang, Xiaojuan, Yayun Zhu, Baiji Hu, Jingyi Cao i Ziqing Lin. "A Novel Power System Side Channel Attack Method Based on Machine Learning CNN-Transformer". Journal of Physics: Conference Series 2615, nr 1 (1.10.2023): 012011. http://dx.doi.org/10.1088/1742-6596/2615/1/012011.
Pełny tekst źródłaAydin, Furkan, Aydin Aysu, Mohit Tiwari, Andreas Gerstlauer i Michael Orshansky. "Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols". ACM Transactions on Embedded Computing Systems 20, nr 6 (30.11.2021): 1–22. http://dx.doi.org/10.1145/3476799.
Pełny tekst źródłaGnanavel, S., K. E. Narayana, K. Jayashree, P. Nancy i Dawit Mamiru Teressa. "Implementation of Block-Level Double Encryption Based on Machine Learning Techniques for Attack Detection and Prevention". Wireless Communications and Mobile Computing 2022 (9.07.2022): 1–9. http://dx.doi.org/10.1155/2022/4255220.
Pełny tekst źródłaWu, Dehua, Wan’ang Xiao, Shan Gao i Wanlin Gao. "A novel cache based on dynamic mapping against speculative execution attacks". MATEC Web of Conferences 355 (2022): 03054. http://dx.doi.org/10.1051/matecconf/202235503054.
Pełny tekst źródłaAlbalawi, Abdullah. "On Preventing and Mitigating Cache Based Side-Channel Attacks on AES System in Virtualized Environments". Computer and Information Science 17, nr 1 (27.02.2024): 9. http://dx.doi.org/10.5539/cis.v17n1p9.
Pełny tekst źródłaMa, Cong, Dinghao Wu, Gang Tan, Mahmut Taylan Kandemir i Danfeng Zhang. "Quantifying and Mitigating Cache Side Channel Leakage with Differential Set". Proceedings of the ACM on Programming Languages 7, OOPSLA2 (16.10.2023): 1470–98. http://dx.doi.org/10.1145/3622850.
Pełny tekst źródłaHe, Jiaji, Xiaolong Guo, Mark Tehranipoor, Apostol Vassilev i Yier Jin. "EM Side Channels in Hardware Security: Attacks and Defenses". IEEE Design & Test 39, nr 2 (kwiecień 2022): 100–111. http://dx.doi.org/10.1109/mdat.2021.3135324.
Pełny tekst źródłaJayasinghe, Darshana, Aleksandar Ignjatovic, Roshan Ragel, Jude Angelo Ambrose i Sri Parameswaran. "QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks". ACM Transactions on Design Automation of Electronic Systems 26, nr 5 (5.06.2021): 1–36. http://dx.doi.org/10.1145/3443706.
Pełny tekst źródłaSoares, Rafael I., Ney L. V. Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine i Lionel Torres. "A GALS Pipeline DES Architecture to Increase Robustness against CPA and CEMA Attacks". Journal of Integrated Circuits and Systems 6, nr 1 (27.12.2011): 25–34. http://dx.doi.org/10.29292/jics.v6i1.335.
Pełny tekst źródłaSzefer, Jakub. "Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses". Journal of Hardware and Systems Security 3, nr 3 (13.09.2018): 219–34. http://dx.doi.org/10.1007/s41635-018-0046-1.
Pełny tekst źródłaGruss, Daniel. "Software-based microarchitectural attacks". it - Information Technology 60, nr 5-6 (19.12.2018): 335–41. http://dx.doi.org/10.1515/itit-2018-0034.
Pełny tekst źródłaTerauchi, Tachio, i Timos Antonopoulos. "Bucketing and information flow analysis for provable timing attack mitigation". Journal of Computer Security 28, nr 6 (27.11.2020): 607–34. http://dx.doi.org/10.3233/jcs-191356.
Pełny tekst źródłaTian, Jing, Gang Xiong, Zhen Li i Gaopeng Gou. "A Survey of Key Technologies for Constructing Network Covert Channel". Security and Communication Networks 2020 (5.08.2020): 1–20. http://dx.doi.org/10.1155/2020/8892896.
Pełny tekst źródłaSantoso, Bagus, i Yasutada Oohama. "Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †". Entropy 21, nr 8 (9.08.2019): 781. http://dx.doi.org/10.3390/e21080781.
Pełny tekst źródłaSalomon, Dor, Amir Weiss i Itamar Levi. "Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis". Cryptography 5, nr 3 (13.09.2021): 24. http://dx.doi.org/10.3390/cryptography5030024.
Pełny tekst źródłaAl-Eidi, Shorouq, Omar Darwish i Yuanzhu Chen. "Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications". Sensors 20, nr 8 (24.04.2020): 2417. http://dx.doi.org/10.3390/s20082417.
Pełny tekst źródłaJia, Hefei, Xu Liu, Xiaoqiang Di, Hui Qi, Binbin Cai, Jinqing Li, Huamin Yang i Jianping Zhao. "A Secure Virtual Machine Allocation Strategy Against Co-Resident Attacks". Journal of Advanced Computational Intelligence and Intelligent Informatics 23, nr 5 (20.09.2019): 898–908. http://dx.doi.org/10.20965/jaciii.2019.p0898.
Pełny tekst źródłaMolotkov, S. N. "Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography". Journal of Experimental and Theoretical Physics 130, nr 6 (czerwiec 2020): 809–32. http://dx.doi.org/10.1134/s1063776120050064.
Pełny tekst źródłaZoughbi, Dina Mohsen, i Nitul Dutta. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment". International Journal of Innovative Technology and Exploring Engineering 10, nr 2 (10.12.2020): 42–48. http://dx.doi.org/10.35940/ijitee.b8262.1210220.
Pełny tekst źródłaMolotkov, S. N., i A. A. Shcherbachenko. "On the Robustness of Reference-Frame-Independent Quantum Key Distribution Systems Against Active Probing Attacks". JETP Letters 119, nr 5 (marzec 2024): 402–12. http://dx.doi.org/10.1134/s0021364024600216.
Pełny tekst źródłaBabukhin, D., i D. Sych. "Explicit attacks on passive side channels of the light source in the BB84 decoy state protocol". Journal of Physics: Conference Series 1984, nr 1 (1.07.2021): 012008. http://dx.doi.org/10.1088/1742-6596/1984/1/012008.
Pełny tekst źródłaCabodi, Gianpiero, Paolo Camurati, Fabrizio Finocchiaro i Danilo Vendraminetto. "Model-Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification". Electronics 8, nr 9 (19.09.2019): 1057. http://dx.doi.org/10.3390/electronics8091057.
Pełny tekst źródłaMishra, Nimish, Kuheli Pratihar, Satota Mandal, Anirban Chakraborty, Ulrich Rührmair i Debdeep Mukhopadhyay. "CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, nr 1 (4.12.2023): 501–26. http://dx.doi.org/10.46586/tches.v2024.i1.501-526.
Pełny tekst źródłaRepka, Marek, i Pavol Zajac. "Overview of the Mceliece Cryptosystem and its Security". Tatra Mountains Mathematical Publications 60, nr 1 (1.09.2014): 57–83. http://dx.doi.org/10.2478/tmmp-2014-0025.
Pełny tekst źródłaYesina, Maryna, i Ivan Gorbenko. "Substantiation of requirements and ways of their realization at synthesis of proof-stable perspective electronic signatures". Physico-mathematical modelling and informational technologies, nr 32 (8.07.2021): 116–20. http://dx.doi.org/10.15407/fmmit2021.32.116.
Pełny tekst źródłaTatarnikova, Tatiyana. "Restricting data leakage through non-obvious features of Android 5 smartphone". Information and Control Systems, nr 5 (16.10.2019): 24–29. http://dx.doi.org/10.31799/1684-8853-2019-5-24-29.
Pełny tekst źródłaFischer, Andreas, Benny Fuhry, Florian Kerschbaum i Eric Bodden. "Computation on Encrypted Data using Dataflow Authentication". Proceedings on Privacy Enhancing Technologies 2020, nr 1 (1.01.2020): 5–25. http://dx.doi.org/10.2478/popets-2020-0002.
Pełny tekst źródłaGnad, Dennis R. E., Cong Dang Khoa Nguyen, Syed Hashim Gillani i Mehdi B. Tahoori. "Voltage-Based Covert Channels Using FPGAs". ACM Transactions on Design Automation of Electronic Systems 26, nr 6 (28.06.2021): 1–25. http://dx.doi.org/10.1145/3460229.
Pełny tekst źródłaFischer, Andreas, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum i Eric Bodden. "Computation on Encrypted Data Using Dataflow Authentication". ACM Transactions on Privacy and Security 25, nr 3 (31.08.2022): 1–36. http://dx.doi.org/10.1145/3513005.
Pełny tekst źródłaMaji, Saurav, Utsav Banerjee i Anantha P. Chandrakasan. "Leaky Nets: Recovering Embedded Neural Network Models and Inputs Through Simple Power and Timing Side-Channels—Attacks and Defenses". IEEE Internet of Things Journal 8, nr 15 (1.08.2021): 12079–92. http://dx.doi.org/10.1109/jiot.2021.3061314.
Pełny tekst źródłaWang, Xingyu, Wei Liu, Tianyi Wu, Chang Guo, Yijun Zhang, Shanghong Zhao i Chen Dong. "Free Space Measurement Device Independent Quantum Key Distribution with Modulating Retro-Reflectors under Correlated Turbulent Channel". Entropy 23, nr 10 (1.10.2021): 1299. http://dx.doi.org/10.3390/e23101299.
Pełny tekst źródłaAinapure, Bharati, Deven Shah i A. Ananda Rao. "Adaptive multilevel fuzzy-based authentication framework to mitigate Cache side channel attack in cloud computing". International Journal of Modeling, Simulation, and Scientific Computing 09, nr 05 (październik 2018): 1850045. http://dx.doi.org/10.1142/s1793962318500459.
Pełny tekst źródłaErata, Ferhat, Chuanqi Xu, Ruzica Piskac i Jakub Szefer. "Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, nr 2 (12.03.2024): 735–68. http://dx.doi.org/10.46586/tches.v2024.i2.735-768.
Pełny tekst źródłaFranzoni, Federico, Xavier Salleras i Vanesa Daza. "AToM: Active topology monitoring for the bitcoin peer-to-peer network". Peer-to-Peer Networking and Applications 15, nr 1 (14.10.2021): 408–25. http://dx.doi.org/10.1007/s12083-021-01201-7.
Pełny tekst źródłaSauvage, Laurent, Sylvain Guilley, Florent Flament, Jean-Luc Danger i Yves Mathieu. "Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography". International Journal of Reconfigurable Computing 2012 (2012): 1–9. http://dx.doi.org/10.1155/2012/360242.
Pełny tekst źródłaHaehyun Cho. "A Systematic Study on Spectre Attacks and Defenses". Research Briefs on Information and Communication Technology Evolution 7 (30.11.2021): 197–203. http://dx.doi.org/10.56801/rebicte.v7i.129.
Pełny tekst źródłaAbduljabbar, Zaid Ameen, Vincent Omollo Nyangaresi, Hend Muslim Jasim, Junchao Ma, Mohammed Abdulridha Hussain, Zaid Alaa Hussien i Abdulla J. Y. Aldarwish. "Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture". Sustainability 15, nr 13 (28.06.2023): 10264. http://dx.doi.org/10.3390/su151310264.
Pełny tekst źródłaShepherd, Michael, Scott Brookes i Robert Denz. "Transient Execution and Side Channel Analysis: a Vulnerability or a Science Experiment?" International Conference on Cyber Warfare and Security 17, nr 1 (2.03.2022): 288–97. http://dx.doi.org/10.34190/iccws.17.1.20.
Pełny tekst źródłaZhang, Qi, An Wang, Yongchuan Niu, Ning Shang, Rixin Xu, Guoshuang Zhang i Liehuang Zhu. "Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9". Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/9701756.
Pełny tekst źródłaTran, Ngoc Quy, i Hong Quang Nguyen. "EFFICIENT CNN-BASED PROFILED SIDE CHANNEL ATTACKS". Journal of Computer Science and Cybernetics 37, nr 1 (29.03.2021): 1–22. http://dx.doi.org/10.15625/1813-9663/37/1/15418.
Pełny tekst źródłaZhou, Ziqiao, i Michael K. Reiter. "Interpretable noninterference measurement and its application to processor designs". Proceedings of the ACM on Programming Languages 5, OOPSLA (20.10.2021): 1–30. http://dx.doi.org/10.1145/3485518.
Pełny tekst źródła