Sciweavers

9588 search results - page 1659 / 1918
» Service Value Networks
Sort
View
JOC
2010
92views more  JOC 2010»
14 years 11 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
TON
2010
107views more  TON 2010»
14 years 11 months ago
Rate Quantization and the Speedup Required to Achieve 100% Throughput for Multicast Over Crossbar Switches
Abstract-- The problem of providing quality of service guarantees for multicast traffic over crossbar switches has received a limited attention, despite the popularity of its count...
Can Emre Koksal
INFOCOM
2011
IEEE
14 years 8 months ago
Feasibility and optimization of delay guarantees for non-homogeneous flows in IEEE 802.11 WLANs
—Due to the rapid growth of real-time applications and the ubiquity of IEEE 802.11 MAC as a layer-2 protocol for wireless local area networks (WLANs), it is of increasing interes...
Yan Gao, Chee Wei Tan, Ying Huang, Zheng Zeng, P. ...
PERCOM
2011
ACM
14 years 8 months ago
Towards preserving privacy in participatory sensing
Abstract—With the abundance and ubiquity of mobile devices, a new class of applications is emerging, called participatory sensing (PS), where people can contribute data (e.g., im...
Leyla Kazemi, Cyrus Shahabi
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 8 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
« Prev « First page 1659 / 1918 Last » Next »