Login / Signup

An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks.

Ali Can AticiCemal YilmazErkay Savas
Published in: SERE (Companion) (2013)
Keyphrases
  • information leakage
  • personal information
  • data sources
  • smart card
  • secret information
  • databases
  • sensitive information
  • query processing
  • privacy preserving