Sciweavers

319 search results - page 12 / 64
» Controlled Secret Leakage
Sort
View
SSS
2009
Springer
14 years 14 days ago
Efficient Robust Storage Using Secret Tokens
Dan Dobre, Matthias Majuntke, Marco Serafini, Neer...
VLSID
2010
IEEE
170views VLSI» more  VLSID 2010»
13 years 1 months ago
Novel Vth Hopping Techniques for Aggressive Runtime Leakage Contro
The continuous increase of leakage power consumption in deep sub-micro technologies necessitates more aggressive leakage control. Runtime leakage control (RTLC) is effective, si...
Hao Xu, Wen-Ben Jone, Ranga Vemuri
CF
2005
ACM
13 years 10 months ago
Controlling leakage power with the replacement policy in slumberous caches
As technology scales down at an exponential rate, leakage power is fast becoming the dominant component of the total power budget. A large share of the total leakage power is diss...
Nasir Mohyuddin, Rashed Bhatti, Michel Dubois
ESORICS
1994
Springer
13 years 11 months ago
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information
It has been observed that often the release of a limited part of an information resource poses no security risks, but the relase of a sufficiently large part of that resource might...
Amihai Motro, Donald G. Marks, Sushil Jajodia
AMW
2010
13 years 9 months ago
Chasing after Secrets in Relational Databases
Abstract. Inference control can guarantee confidentiality but is costly to implement. Access control can be implemented efficiently but cannot guarantee confidentiality. Hence, it ...
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan...