Search

Your search keyword '"Youngjoo Shin"' showing total 26 results

Search Constraints

Start Over You searched for: Author "Youngjoo Shin" Remove constraint Author: "Youngjoo Shin" Topic 02 engineering and technology Remove constraint Topic: 02 engineering and technology
26 results on '"Youngjoo Shin"'

Search Results

1. Multibyte Microarchitectural Data Sampling and its Application to Session Key Extraction Attacks

2. Constructing Covert Channel on Intel CPU-iGPU platform

3. Return of version downgrade attack in the era of TLS 1.3

4. Software-based Random Number Generators for Resource Constrained Devices

5. POSTER: Mitigating Memory Sharing-based Side-channel Attack by Embedding Random Values in Binary for Cloud Environment

6. Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization

7. On the Security of Practical Mail User Agents against Cache Side-Channel Attacks

8. Lightweight and Seamless Memory Randomization for Mission-Critical Services in a Cloud Platform

9. Cache Side-Channel Attack on Mail User Agent

10. Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments

11. FPGA reverse engineering in Vivado design suite based on X-ray project

12. Real-Time Detection on Cache Side Channel Attacks using Performance Counter Monitor

13. High Efficiency, Low-noise Meltdown Attack by using a Return Stack Buffer

14. A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems

15. CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware

16. Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience

17. Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage

18. Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services

19. Secure proof of storage with deduplication for cloud storage systems

20. Privacy-Preserving Aggregation and Authentication of Multi-Source Smart Meters in a Smart Grid System

21. An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability

22. Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

23. SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage

24. A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing

25. Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage

26. An efficient stream cipher for resistive RAM

Catalog

Books, media, physical & digital resources