01990nam 2200433z- 450 991055743430332120211118(CKB)5400000000043380(oapen)https://directory.doabooks.org/handle/20.500.12854/73787(oapen)doab73787(EXLCZ)99540000000004338020202111d2020 |y 0engurmn|---annantxtrdacontentcrdamediacrrdacarrierEmerging Translational Opportunities in Comparative Oncology with Companion Canine CancersFrontiers Media SA20201 online resource (201 p.)2-88963-645-3 This eBook is a collection of articles from a Frontiers Research Topic. Frontiers Research Topics are very popular trademarks of the Frontiers Journals Series: they are collections of at least ten articles, all centered on a particular subject. With their unique mix of varied contributions from Original Research to Review Articles, Frontiers Research Topics unify the most influential researchers, the latest key findings and historical advances in a hot research area! Find out more on how to host your own Frontiers Research Topic or contribute to one as an author by contacting the Frontiers Editorial Office: frontiersin.org/about/contactMedicine and NursingbicsscOncologybicssccancer biologycancer diagnosticcancer therapycaninecomparative oncologyMedicine and NursingOncologyDewhirst Mark Wedt1314856Page Rodney LedtDewhirst Mark WothPage Rodney LothBOOK9910557434303321Emerging Translational Opportunities in Comparative Oncology with Companion Canine Cancers3032053UNINA03948nam 22011893a 450 991034667370332120250203235431.09783039210015303921001710.3390/books978-3-03921-001-5(CKB)4920000000094930(oapen)https://directory.doabooks.org/handle/20.500.12854/59342(ScCtBLL)812dddf7-ea06-422c-98bc-de779c9b3b06(OCoLC)1117898373(oapen)doab59342(EXLCZ)99492000000009493020250203i20192019 uu engurmn|---annantxtrdacontentcrdamediacrrdacarrierSide Channel AttacksSeokhie HongMDPI - Multidisciplinary Digital Publishing Institute2019Basel, Switzerland :MDPI,2019.1 electronic resource (258 p.)9783039210008 3039210009 This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.History of engineering and technologybicsscbinary Huff curveFPGApost quantum cryptographydata lossside-channel cache attacksrsa cryptosystemfirst-order analysischaotic circuitintegrityad librariespower-analysis attacksingle trace analysisside-channel authenticationprovable securityad libcache missescache side-channel attackleakage modelNTRUgraphAEShardware securityrecovery of secret exponent by triangular trace analysisside-channel attacksinformation leakagedata outsourcingCPLDscatter-gather implementationmodular exponentiationlattice-based cryptographyelliptic curve cryptographyGaussian samplingpost-quantum cryptographyreliabilityunified point additionad networksgraph similaritymobile adsphysically unclonable functiontweakable block cipherMerkle (hash) treemachine-learning classificationside channel attackonline authenticationside channel analysisfinancial IC cardside-channel attackre-keyingcloud computingcryptographic keyschaos theoryhorizontal collision correlation analysiscountermeasureembedded system securitycache attacksingle-trace attacksoftware development kit (SDK)CDT samplingkey bit-dependent attackside-channel analysissecond-order analysisconstant-time cryptographic algorithmandroid package (APK)challenge-response authenticationHistory of engineering and technologyHong Seokhie1329303ScCtBLLScCtBLLBOOK9910346673703321Side Channel Attacks3039404UNINA