Login / Signup
Information theoretical evaluation of the bucketing technique to mitigate timing attacks.
Yasuyuki Kobayashi
Yuichi Kaji
Hiroyuki Seki
Published in:
ISITA (2014)
Keyphrases
</>
information sources
case study
end users
information processing
information sharing
genetic algorithm
information systems
prior knowledge
computer systems
theoretical analysis
information content