نتایج جستجو برای: flush reload attack

تعداد نتایج: 83375  

Journal: :J I M P - Jurnal Informatika Merdeka Pasuruan 2018

Journal: :Journal of Clinical Sleep Medicine 2011

Journal: :The American journal of sports medicine 2011
L Daniel Latt Richard R Glisson Harvey E Montijo Federico G Usuelli Mark E Easley

BACKGROUND Osteochondral allograft transplantation is technically demanding. It is not always possible to place the surface of the graft perfectly flush with the surrounding cartilage. One must often choose between placing at least some portion of the surface of the graft slightly elevated or recessed. The effect of this choice on joint contact pressure is unknown. PURPOSE This study was unde...

Journal: :Journal of the Japan Society of Colour Material 1958

Journal: :Journal of the Japan Society of Colour Material 1956

2017
Marc Green Leandro Rodrigues Lima Andreas Zankl Gorka Irazoqui Apecechea Johann Heyszl Thomas Eisenbarth

Attacks on the microarchitecture of modern processors have become a practical threat to security and privacy in desktop and cloud computing. Recently, cache attacks have successfully been demonstrated on ARM based mobile devices, suggesting they are as vulnerable as their desktop or server counterparts. In this work, we show that previous literature might have left an overly pessimistic conclus...

Journal: :Annals of Internal Medicine 2019

Journal: :Journal of the Japan Society of Colour Material 1956

Journal: :isecure, the isc international journal of information security 0
s. sajjadi ghaemmaghami department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran a. haghbin department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran m. mirmohseni department of electrical engineering, sharif university of technology, tehran, iran

radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید