Skip to search formSkip to main contentSkip to account menu

Information leakage

Information leakage happens whenever a system that is designed to be closed to an eavesdropper reveals some information to unauthorized parties… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
By developing information technology and production methods and collecting data, a great amount of data is daily being collected… 
2015
2015
This paper discusses the design of high power density transformer and inductor for the high frequency dual active bridge (DAB… 
2012
2012
The design of leakage-resilient password systems (LRPSes) in the absence of trusted devices remains a challenging problem today… 
2010
2010
This study presents the results of a multidisciplinary approach, using hydrogeochemical, isotopic and ecotoxicological analyses… 
2008
2008
The relation between the phase separated morphologies and their transport properties in the polymer blend membrane for direct… 
2003
2003
  • J. HwangJ. Ho F. Wen
  • 2003
  • Corpus ID: 36922091
An 86% electron mobility improvement and over 20% I/sub dn-sat/ enhancement were demonstrated for a 70 nm strained-Si CMOS… 
Highly Cited
2001
Highly Cited
2001
This paper presents evidence of persistent anomalies in internet firms' stock returns surrounding their quarterly earnings… 
Review
2000
Review
2000
We review a powerful temporal-based algorithm, a triple temporal filter (TTF) with six input parameters, for detecting and… 
Highly Cited
2000
Highly Cited
2000
We research and document that the abnormal returns earned by Australian bidders and targets over the bid announcement period are… 
1999
1999
For the first time, a sub-100 nm gate length CMOS transistor is demonstrated with the source/drain extension implemented by laser…