Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information Leakage
biblio
On the information leakage of finite block-length wiretap polar codes
Submitted by grigby1 on Fri, 07/01/2022 - 7:30am
Physical layer
wiretap channel
information theory
Equivocation
Information Leakage
Resiliency
polar codes
coding theory
physical layer security
security
Decoding
Complexity theory
Task Analysis
Metrics
estimation
resilience
pubcrawl
biblio
Low-overhead Solutions For Preventing Information Leakage Due To Hardware Trojan Horses
Submitted by grigby1 on Thu, 05/19/2022 - 12:03pm
Trojan horses
trojan horse detection
Information Leakage
CRC
mac
Microprocessors
Cyclones
Hardware Trojans
resource management
encryption
Runtime
composability
Hardware
FPGA
Resiliency
resilience
pubcrawl
biblio
Traffic Normalization for Covert Channel Protecting
Submitted by grigby1 on Tue, 04/19/2022 - 2:13pm
information security
tools
timing
telecommunication traffic
security
Scalability
Resiliency
resilience
residual covert channel capacity
pubcrawl
normalization
channel capacity
Information Leakage
estimation
Data protection
covert channels
covert channel
countermeasure
Compositionality
composability
Channel estimation
biblio
On the Information Leakage in Private Information Retrieval Systems
Submitted by grigby1 on Thu, 04/08/2021 - 4:10pm
chaotic communication
total leakage
private information retrieval systems
PIR systems
individual message leakage
common randomness
coding schemes
information forensics
Information Leakage
encryption
information retrieval
security
privacy
Scalability
data privacy
Indexes
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Implementation White Box Cryptography in Substitution-Permutation network
Submitted by grigby1 on Thu, 03/04/2021 - 1:33pm
resilience
white-box cryptography
White Box Security
white box
substitution-permutation network
side-channel attacks
Side-channel attack
security
Resiliency
white box cryptography
pubcrawl
privacy
Metrics
leak channels
Information Leakage
Cryptography
composability
biblio
The Minimum Cost of Information Erasure for Stationary Memoryless Sources under Restriction on the Output Distribution
Submitted by grigby1 on Tue, 02/16/2021 - 12:25pm
general sources
unrelated sequence
uniformly distributed sequences
stationary memoryless sources
single-letter characterization
Random sequences
random sequence
output distribution
minimum cost
memoryless systems
information erasure
privacy
conditional resolvability
Data Sanitization
source coding
Information Leakage
confidential information
Compositionality
Resiliency
resilience
Human behavior
pubcrawl
biblio
Privacy-Preserving Keyword Search Schemes over Encrypted Cloud Data: An Extensive Analysis
Submitted by aekwall on Mon, 11/23/2020 - 10:21am
Intelligent Data Security
verifiability
storage management
Servers
security
Scalability
Resiliency
remote servers
pubcrawl
privacy-preserving keyword search schemes
privacy issue
privacy
keyword search functions
Keyword search
Big Data
Intelligent Data and Security
Information Leakage
Indexes
encryption
encrypted cloud data
efficiency
data privacy
Cryptography
Compositionality
cloud storage services
cloud storage
Cloud Computing
biblio
Privacy-Preserving Fuzzy Multi-Keyword Search for Multiple Data Owners in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 11:02am
locality-sensitive hashing
Computing Theory and Privacy
single data owner model
searchable encryption schemes
search privacy
privacy-preserving fuzzy multikeyword search
plaintext search techniques
multiple data owners
LSH
Information Leakage
fuzzy multi-keyword search.
encrypted documents
ciphertext search
Bloom filter
BF
Cloud Computing
Privacy-preserving
encryption method
cloud server
Indexes
fuzzy set theory
query processing
pubcrawl
Human behavior
Resiliency
data privacy
encryption
Cryptography
Servers
Scalability
biblio
Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Power Attacks
fully controlled access
generic attack
high resolution EM probes
high-performance implementation
localized electromagnetic attack
localized EM attacks
minimum traces to disclosure
permutation network
potent threat
fixed S-box
profiled attack
randomization results
Semiconductor device measurement
side-channel attacks
spatial randomization
state register byte
transient random value
black box encryption
AES
encryption
Information Leakage
pubcrawl
composability
Metrics
Resiliency
resilience
sensitive data
Registers
Cryptography
Probes
black-box model attack
countermeasures
dataflow
datapath components
dynamic random mapping
embedded cryptographic implementations
exploitable leakage
biblio
HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature
Submitted by grigby1 on Fri, 08/07/2020 - 2:38pm
HOTSPOT
air-gapped PCs
airgap crossing technique
Android (operating system)
Android app
covert-channels
CPUs
exfiltration
GPUs
air-gapped computers
isolated PCs
nearby smartphone
temperature
thermal
thermal pings
thermal sensing
thermal signals
pubcrawl
air-gap covert communication channels
air-gap
Air gaps
Information Leakage
Smartphones
smart phones
resilience
Metrics
mobile computing
composability
internet
computer network security
Resiliency
Human Factors
Human behavior
1
2
3
4
next ›
last »