Sciweavers

1369 search results - page 47 / 274
» A Practical Implementation of the Timing Attack
Sort
View
101
Voted
SBP
2010
Springer
15 years 4 months ago
Social Network Data and Practices: The Case of Friendfeed
Due to their large worldwide adoption, Social Network Sites (SNSs) have been widely used in many global events as an important source to spread news and information. While the sear...
Fabio Celli, F. Marta L. Di Lascio, Matteo Magnani...
91
Voted
ICPP
1990
IEEE
15 years 2 months ago
Implementing Sequential Consistency in Cache-Based Systems
A model for shared-memory systems commonly (and often implicitly) assumed by programmers is that of sequential consistency. For implementing sequential consistency in a cache-base...
Sarita V. Adve, Mark D. Hill
WEA
2007
Springer
104views Algorithms» more  WEA 2007»
15 years 5 months ago
Dynamic Trees in Practice
Dynamic tree data structures maintain forests that change over time through edge insertions and deletions. Besides maintaining connectivity information in logarithmic time, they ca...
Robert Endre Tarjan, Renato Fonseca F. Werneck
67
Voted
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
15 years 4 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
78
Voted
COMPSAC
2008
IEEE
15 years 5 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...