Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Timing channel is a redirect to covert channel

searching for Timing channel 8 found (12 total)

alternate case: timing channel

Timing attack (1,524 words) [view diff] no match in snippet view article find links to article

In cryptography, a timing attack is a side-channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute
UNISERVO I (614 words) [view diff] exact match in snippet view article find links to article
for the data value, one parity channel for error checking, and one timing channel) at a density of 128 bits per inch. The tape could be moved at 100 inches
Implementations of differentially private analyses (1,342 words) [view diff] exact match in snippet view article find links to article
leakage rate and must be followed with non-trivial cryptanalysis, a timing channel may lead to a catastrophic compromise of a differentially private system
Data exfiltration (625 words) [view diff] exact match in snippet view article find links to article
web applications to provide a malicious actor with sensitive data. A timing channel can also be used to send data a few packets at a time at specified intervals
Allen R. Miller (628 words) [view diff] case mismatch in snippet view article find links to article
; Miller, Allen R. (1992). "The Channel Capacity of a Certain Noisy Timing Channel". IEEE Transactions on Information Theory. 38 (4): 1339–1344. doi:10
Digital delay generator (1,657 words) [view diff] exact match in snippet view article find links to article
to allow a gating function. Some delay generators provide a single timing channel, while others provide multiple timing channels. Digital delay generator
Amelia and Michael (2,273 words) [view diff] case mismatch in snippet view article find links to article
Archived from the original on 18 March 2012. Retrieved 1 April 2011. "Good timing Channel 4". Deb Khan – Creative Inspiration. Archived from the original on 11
List of steganography techniques (3,446 words) [view diff] exact match in snippet view article find links to article
realised three obvious covert channels (two storage channels and one timing channel), and his research paper entitled “Covert channels in LAN’s” published