Sciweavers

14824 search results - page 2765 / 2965
» Security - Introduction
Sort
View
IMC
2010
ACM
14 years 9 months ago
A first look at traffic on smartphones
Using data from 43 users across two platforms, we present a detailed look at smartphone traffic. We find that browsing contributes over half of the traffic, while each of email, me...
Hossein Falaki, Dimitrios Lymberopoulos, Ratul Mah...
IMC
2010
ACM
14 years 9 months ago
Netalyzr: illuminating the edge network
In this paper we present Netalyzr, a network measurement and debugging service that evaluates the functionality provided by people's Internet connectivity. The design aims to...
Christian Kreibich, Nicholas Weaver, Boris Nechaev...
INDOCRYPT
2010
Springer
14 years 9 months ago
Attack on a Higher-Order Masking of the AES Based on Homographic Functions
In the recent years, Higher-order Side Channel attacks have been widely investigated. In particular, 2nd-order DPA have been improved and successfully applied to break several mask...
Emmanuel Prouff, Thomas Roche
137
Voted
MOBIHOC
2010
ACM
14 years 9 months ago
Detecting intra-room mobility with signal strength descriptors
We explore the problem of detecting whether a device has moved within a room. Our approach relies on comparing summaries of received signal strength measurements over time, which ...
Konstantinos Kleisouris, Bernhard Firner, Richard ...
OPODIS
2010
14 years 9 months ago
Self-stabilizing (k, r)-Clustering in Wireless Ad-hoc Networks with Multiple Paths
Abstract. Wireless Ad-hoc networks are distributed systems that often reside in error-prone environments. Self-stabilization lets the system recover autonomously from an arbitrary ...
Andreas Larsson, Philippas Tsigas
« Prev « First page 2765 / 2965 Last » Next »