• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks.

Ali Can AticiCemal YilmazErkay Savas
Published in: SERE (Companion) (2013)
Keyphrases
  • information leakage
  • personal information
  • data sources
  • smart card
  • secret information
  • databases
  • sensitive information
  • query processing
  • privacy preserving