6 results on '"Janaka Alawatugoda"'
Search Results
2. Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack.
3. Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange.
4. Protecting Encrypted Cookies from Compression Side-Channel Attacks.
5. Continuous After-the-Fact Leakage-Resilient Key Exchange.
6. Modelling after-the-fact leakage for key exchange.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.