Login / Signup
An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks.
Ali Can Atici
Cemal Yilmaz
Erkay Savas
Published in:
SERE (Companion) (2013)
Keyphrases
</>
information leakage
personal information
data sources
smart card
secret information
databases
sensitive information
query processing
privacy preserving