Sciweavers

4511 search results - page 536 / 903
» Observation Based System Security
Sort
View
EUROCRYPT
2009
Springer
16 years 5 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
DCOSS
2007
Springer
15 years 11 months ago
Localization for Anchoritic Sensor Networks
We introduce a class of anchoritic sensor networks, where communications between sensor nodes are undesirable or infeasible due to, e.g., harsh environments, energy constraints, or...
Yuliy M. Baryshnikov, Jian Tan
177
Voted
EPEW
2007
Springer
15 years 11 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...
OOPSLA
2007
Springer
15 years 11 months ago
Microphase: an approach to proactively invoking garbage collection for improved performance
To date, the most commonly used criterion for invoking garbage collection (GC) is based on heap usage; that is garbage collection is invoked when the heap or an area inside the he...
Feng Xian, Witawas Srisa-an, Hong Jiang
OOPSLA
2005
Springer
15 years 10 months ago
Fine-grained interoperability through mirrors and contracts
As a value flows across the boundary between interoperating languages, it must be checked and converted to fit the types and representations of the target language. For simple f...
Kathryn E. Gray, Robert Bruce Findler, Matthew Fla...