共 50 条
- [41] Side-Channel Attacks on Shared Search Indexes [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 673 - 692
- [42] Side-Channel Attacks on Mobile and Wearable Systems [J]. 2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
- [45] A tutorial on physical security and side-channel attacks [J]. FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 78 - 108
- [46] Side-Channel Expectation-Maximization Attacks [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 774 - 799
- [47] Side-Channel Attacks and Machine Learning Approach [J]. 2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 181 - 186
- [48] On the Feasibility of Side-Channel Attacks in a Virtualized Environment [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 319 - 339
- [49] On the Correctness of an Approach against Side-Channel Attacks [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 336 - +
- [50] How to Compare Profiled Side-Channel Attacks? [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 485 - +