Sciweavers

1085 search results - page 106 / 217
» A Timing Attack on RC5
Sort
View
TMC
2010
151views more  TMC 2010»
14 years 8 months ago
Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks
—Third Generation (3G) cellular networks take advantage of time-varying and location-dependent channel conditions of mobile users to provide broadband services. Under fairness an...
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu
SDMW
2010
Springer
14 years 7 months ago
Computationally Efficient Searchable Symmetric Encryption
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little ...
Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, P...
ICASSP
2011
IEEE
14 years 1 months ago
Detecting low-rate periodic events in Internet traffic using renewal theory
In our previous work [1, 2] we studied detection of anomalies in packet arrival times for computer networks, most detection of denialof-service (DoS) attacks in Internet traffic....
Sean McPherson, Antonio Ortega
CHES
2011
Springer
276views Cryptology» more  CHES 2011»
13 years 10 months ago
FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control
Abstract. The paper presents a novel and efficient method to generate true random numbers on FPGAs by inducing metastability in bi-stable circuit elements, e.g. flip-flops. Meta...
Mehrdad Majzoobi, Farinaz Koushanfar, Srinivas Dev...
COMPSYSTECH
2011
13 years 9 months ago
Encoding watermark numbers as cographs using self-inverting permutations
Abstract. In a software watermarking environment, several graph theoretic watermark methods encode the watermark values as graph structures and embed them in application programs. ...
Maria Chroni, Stavros D. Nikolopoulos