In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design st...
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingr...
This paper analyzes the performance of two implementations of J-Flow, the flow measurement tool deployed on most Juniper routers. Our work relies on both controlled experiments an...
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Abstract--The steadily growing importance of Internetbased applications and their resilience requirements lead to a rising number of multi-homed sites. The idea of Concurrent Multi...
Thomas Dreibholz, Martin Becke, Jobin Pulinthanath...
Abstract. We propose a new type discipline for the -calculus in which secure information flow is guaranteed by static type checking. Secrecy levels are assigned to channels and are...