Sign in

Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control.

Marcus VölpAdam LackorzynskiJérémie DecouchantVincent RahliFrancisco RochaPaulo Jorge Esteves Veríssimo
Published in: SysTEX@Middleware (2016)
Keyphrases
  • control system
  • traffic analysis
  • data sets
  • video watermarking
  • learning algorithm
  • information systems
  • control strategy
  • watermarking algorithm
  • watermarking technique