Sciweavers

5273 search results - page 923 / 1055
» Secured Web Access
Sort
View
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 8 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
GCC
2006
Springer
15 years 8 months ago
Hierarchical Replica Location Service Based on Hybrid Overlay Platform
An important problem that confronts data grid applications is to efficiently locate the node that stores a particular data replica. This paper proposes a Hierarchical Replica Loca...
Jianjin Jiang, Guangwen Yang, Yongwei Wu, Wusheng ...
GCC
2006
Springer
15 years 8 months ago
UGE4B: An Universal Grid Environment for Bioinformatics Research
Recent years, grid technology has been used widely in the fields of scientific research. In this paper, we present an universal grid environment for Bioinformatics Research (UGE4B...
Gang Chen, Yongwei Wu, Weimin Zheng
CCGRID
2001
IEEE
15 years 8 months ago
Replica Selection in the Globus Data Grid
The Globus Data Grid architecture provides a scalable infrastructure for the management of storage resources and data that are distributed across Grid environments. These services...
Sudharshan Vazhkudai, Steven Tuecke, Ian T. Foster
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
15 years 6 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...