Sciweavers

1599 search results - page 4 / 320
» Program Analysis for Security and Privacy
Sort
View
79
Voted
CSFW
2007
IEEE
15 years 8 months ago
Electing the Doge of Venice: Analysis of a 13th Century Protocol
Miranda Mowbray, Dieter Gollmann
PET
2007
Springer
15 years 8 months ago
Sampled Traffic Analysis by Internet-Exchange-Level Adversaries
Steven J. Murdoch, Piotr Zielinski
91
Voted
ACISP
2006
Springer
15 years 7 months ago
Cache Based Power Analysis Attacks on AES
Jacques J. A. Fournier, Michael Tunstall
SP
2003
IEEE
15 years 7 months ago
Probabilistic Treatment of MIXes to Hamper Traffic Analysis
Dakshi Agrawal, Dogan Kesdogan, Stefan Penz