Sciweavers

1599 search results - page 4 / 320
» Program Analysis for Security and Privacy
Sort
View
PET
2007
Springer
15 years 11 months ago
Sampled Traffic Analysis by Internet-Exchange-Level Adversaries
Steven J. Murdoch, Piotr Zielinski
119
Voted
ACISP
2006
Springer
15 years 11 months ago
Cache Based Power Analysis Attacks on AES
Jacques J. A. Fournier, Michael Tunstall
SP
2003
IEEE
15 years 10 months ago
Probabilistic Treatment of MIXes to Hamper Traffic Analysis
Dakshi Agrawal, Dogan Kesdogan, Stefan Penz