Most side-channel attacks that have been published in the open literature assume known- or chosen-message adversarial scenarios. In this paper, we analyze the increase of the attac...
In disclosing micro-data with sensitive attributes, the goal is usually two fold. First, the data utility of disclosed data should be maximized for analysis purposes. Second, the ...
Within a consideration of cost effectiveness the evaluation of design science research artifacts is of major importance. In the past, a plenitude of approaches has been developed ...
Abstract. Robust object tracking is required by many vision applications, and it will be useful for the motion analysis of moving object if we can not only track the object, but al...
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...