We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
E-business is becoming the trademark of the 2000s. Companies are using the Web to communicate with their partners, connect with their back-end systems, and perform e-commerce tran...
We present the design and implementation of the Janus1 architecture for providing flexible and lightweight access to sensor network resources from Internet-type networks. Janus p...
In this work the authors present an analytical model that -- compared to previously published work -- more accurately captures the delay of IEEE 802.11 protocol under low, medium,...
As modern software-based systems and applications gain in versatility and functionality, the ability to manage inconsistent resources and service disparate user requirements becom...
Debanjan Ghosh, Raj Sharman, H. Raghav Rao, Shambh...