نتایج جستجو برای: run time leakage

تعداد نتایج: 1977427  

2000
Arash Baratloo Navjot Singh Timothy Tsai

Stack Smashing Attacks Arash Baratloo and Navjot Singh farash,[email protected] Bell Labs Research, Lucent Technologies 600 Mountain Ave Murray Hill, NJ 07974 USA Timothy Tsai [email protected] Reliable Software Technologies 21351 Ridgetop Circle, Suite 400 Dulles, VA 20166 USA Abstract The exploitation of bu er over ow vulnerabilities in process stacks constitutes a signi cant port...

Journal: :IEEE Trans. Computers 1999
Teresa L. Johnson Daniel A. Connors Matthew C. Merten Wen-mei W. Hwu

2002
KRISTIAN OVERGAARD TORBEN CLAUSEN

Overgaard, Kristian, Tue Lindstrøm, Thorsten Ingemann-Hansen, and Torben Clausen. Membrane leakage and increased content of Na -K pumps and Ca2 in human muscle after a 100-km run. J Appl Physiol 92: 1891–1898, 2002. First published January 4, 2002; 10.1152/japplphysiol.00669. 2001.—During prolonged exercise, changes in the ionic milieu in and surrounding the muscle fibers may lead to fatigue or...

Journal: :Future Internet 2017
Davy Preuveneers Wouter Joosen

Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality. Such a ‘single responsibility principle’ design makes them well suited for constructing scalable and flexible data integration and real-time data flow applications. In this paper, we investigate mic...

Journal: :journal of mahani mathematical research center 0
seyed morteza babamir university of khashan

0

Journal: :IEEE Transactions on Information Theory 2006

Journal: :IACR Cryptology ePrint Archive 2009
Sebastian Faust Eike Kiltz Krzysztof Pietrzak Guy N. Rothblum

The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to “side-channel attacks” which exploit leakage of information about the secret internal state. In this work we put forward the notion of “leakage-resilient signatures,” which strengthens the standard security notion by gi...

2003
Ramon Prieto Sora Kim

We describe a pitch tracking method based on a time delay estimation technique. Given two frames of voiced speech and it’s time delay, we will run a linear regression on the unwrapped phase of the quotient of the spectrum of both frames. A weighted linear regression will allow us to avoid the effect of phases corrupted by spectral leakage and noise. Iterations adapting the frame length will all...

Journal: :The Journal of Object Technology 2002

Journal: :Electronic Notes in Theoretical Computer Science 2006

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید