Sciweavers

1369 search results - page 27 / 274
» A Practical Implementation of the Timing Attack
Sort
View
PVLDB
2008
138views more  PVLDB 2008»
13 years 7 months ago
Authenticating the query results of text search engines
The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online search engines. A breached server that is not detected in time...
HweeHwa Pang, Kyriakos Mouratidis
FC
2004
Springer
80views Cryptology» more  FC 2004»
14 years 28 days ago
Practical Anonymity for the Masses with MorphMix
MorphMix is a peer-to-peer circuit-based mix network to provide practical anonymous low-latency Internet access for millions of users. The basic ideas of MorphMix have been publish...
Marc Rennhard, Bernhard Plattner
USS
2010
13 years 5 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
IANDC
2008
128views more  IANDC 2008»
13 years 7 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
VTC
2006
IEEE
117views Communications» more  VTC 2006»
14 years 1 months ago
Design and Implementation of Robust Time/Frequency Offset Tracking Algorithm for MIMO-OFDM Receivers
— In this paper, the robust time and frequency offset tracking algorithms and architecture for high throughput wireless local area network (WLAN) systems are presented. The desig...
Il-Gu Lee, Heejung Yu, Eunyoung Choi, Jungbo Son, ...