Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,232,158 papers from all fields of science
Search
Sign In
Create Free Account
Information leakage
Information leakage happens whenever a system that is designed to be closed to an eavesdropper reveals some information to unauthorized parties…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
CRIME
Chaffing and winnowing
Cryptographic nonce
Data compression
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
A survey on privacy preserving association rule mining
Narges Jamshidian Ghalehsefidi
,
M. N. Dehkordi
2015
Corpus ID: 155477
By developing information technology and production methods and collecting data, a great amount of data is daily being collected…
Expand
2015
2015
Design of integrated transformer and inductor for high frequency dual active bridge GaN Charger for PHEV
Mingkai Mu
,
Lingxiao Xue
,
D. Boroyevich
,
B. Hughes
,
P. Mattavelli
Applied Power Electronics Conference
2015
Corpus ID: 25853845
This paper discusses the design of high power density transformer and inductor for the high frequency dual active bridge (DAB…
Expand
2012
2012
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability
Qiang Yan
,
Jin Han
,
Yingjiu Li
,
R. Deng
Network and Distributed System Security Symposium
2012
Corpus ID: 16311412
The design of leakage-resilient password systems (LRPSes) in the absence of trusted devices remains a challenging problem today…
Expand
2010
2010
Environmental issues in urban groundwater systems: a multidisciplinary study of the Paranhos and Salgueiros spring waters, Porto (NW Portugal)
M. Afonso
,
H. Chaminé
,
+7 authors
F. Rocha
2010
Corpus ID: 56268607
This study presents the results of a multidisciplinary approach, using hydrogeochemical, isotopic and ecotoxicological analyses…
Expand
2008
2008
Transport properties of polymer blend membranes of sulfonated and nonsulfonated polysulfones for direct methanol fuel cell application
Dong Hwee Kim
,
S. C. Kim
2008
Corpus ID: 95918528
The relation between the phase separated morphologies and their transport properties in the polymer blend membrane for direct…
Expand
2003
2003
Performance of 70 nm strained-silicon CMOS devices
J. Hwang
,
J. Ho
,
+21 authors
F. Wen
Symposium on VLSI Technology. Digest of Technical…
2003
Corpus ID: 36922091
An 86% electron mobility improvement and over 20% I/sub dn-sat/ enhancement were demonstrated for a 70 nm strained-Si CMOS…
Expand
Highly Cited
2001
Highly Cited
2001
Anomalous Stock Returns Around Internet Firms' Earnings Announcements
Brett Trueman
,
M. Wong
,
Xiao-Jun Zhang
2001
Corpus ID: 18944210
This paper presents evidence of persistent anomalies in internet firms' stock returns surrounding their quarterly earnings…
Expand
Review
2000
Review
2000
Optimization of point target tracking filters
C. E. Caefer
,
J. Silverman
,
J. Mooney
IEEE Transactions on Aerospace and Electronic…
2000
Corpus ID: 31711020
We review a powerful temporal-based algorithm, a triple temporal filter (TTF) with six input parameters, for detecting and…
Expand
Highly Cited
2000
Highly Cited
2000
The Method of Payment Decision in Australian Takeovers: An Investigation of Causes and Effects
Raymond Silva Da Rosa
,
H. Izan
,
Adam Steinbeck
,
T. Walter
2000
Corpus ID: 157129215
We research and document that the abnormal returns earned by Australian bidders and targets over the bid announcement period are…
Expand
1999
1999
70 nm MOSFET with ultra-shallow, abrupt, and super-doped S/D extension implemented by laser thermal process (LTP)
Bin Yu
,
Yun Wang
,
+4 authors
Ming-Ren Lin
International Electron Devices Meeting…
1999
Corpus ID: 30779589
For the first time, a sub-100 nm gate length CMOS transistor is demonstrated with the source/drain extension implemented by laser…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE