Sciweavers

9223 search results - page 1714 / 1845
» Privacy-preserving performance measurements
Sort
View
WWW
2009
ACM
15 years 8 months ago
Network-aware forward caching
This paper proposes and evaluates a Network Aware Forward Caching approach for determining the optimal deployment strategy of forward caches to a network. A key advantage of this ...
Jeffrey Erman, Alexandre Gerber, Mohammad Taghi Ha...
AFRICACRYPT
2009
Springer
15 years 8 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...
CCS
2009
ACM
15 years 8 months ago
Ripley: automatically securing web 2.0 applications through replicated execution
Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many...
K. Vikram, Abhishek Prateek, V. Benjamin Livshits
CCS
2009
ACM
15 years 8 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
ICC
2009
IEEE
112views Communications» more  ICC 2009»
15 years 8 months ago
Push Popular Segments in P2P VoD System: Possibility and Design
—Video-on-Demand (VoD) services have attracted a lot of attentions in recent years. Measurement studies show that VCR (Video Cassette Recorder) operations, such as pause, rewind,...
Junfeng Xie, Edward Chan, Guihai Chen, Yang Guo
« Prev « First page 1714 / 1845 Last » Next »