Sciweavers

1369 search results - page 23 / 274
» A Practical Implementation of the Timing Attack
Sort
View
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
ISPDC
2010
IEEE
13 years 6 months ago
Practical Uniform Peer Sampling under Churn
—Providing independent uniform samples from a system population poses considerable problems in highly dynamic settings, like P2P systems, where the number of participants and the...
Roberto Baldoni, Marco Platania, Leonardo Querzoni...
CORR
2008
Springer
179views Education» more  CORR 2008»
13 years 7 months ago
Practical Automated Partial Verification of Multi-Paradigm Real-Time Models
This article introduces a fully automated verification technique that permits to analyze real-time systems described using a continuous notion of time and a mixture of operational...
Carlo A. Furia, Matteo Pradella, Matteo Rossi
IFIP
2007
Springer
14 years 1 months ago
In-Time Role-Specific Notification as Formal Means to Balance Agile Practices in Global Software Development Settings
In global software development (GSD) projects, distributed teams collaborate to deliver high-quality software. Project managers need to control these development projects, which in...
Dindin Wahyudin, Matthias Heindl, Benedikt Eckhard...
IMA
2009
Springer
221views Cryptology» more  IMA 2009»
14 years 2 months ago
Cache Timing Analysis of LFSR-Based Stream Ciphers
Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated ag...
Gregor Leander, Erik Zenner, Philip Hawkes