Sciweavers

1085 search results - page 186 / 217
» A Timing Attack on RC5
Sort
View
ICDM
2006
IEEE
158views Data Mining» more  ICDM 2006»
14 years 3 months ago
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis
Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly unders...
Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah,...
ICMCS
2006
IEEE
135views Multimedia» more  ICMCS 2006»
14 years 3 months ago
A Fingerprinting System for Musical Content
Abstract— Driven by the recent advances in digital entertainment technologies, digital multimedia content (such as music and movies) is becoming a major part of the average compu...
Lahouari Ghouti, Ahmed Bouridane, Mohammad K. Ibra...
INFOCOM
2006
IEEE
14 years 3 months ago
A Node Identity Internetworking Architecture
— The Internet consists of independent networks that belong to different administrative domains and vary in scope from personal area networks, private home networks, corporate ne...
Bengt Ahlgren, Jari Arkko, Lars Eggert, Jarno Raja...
IPPS
2006
IEEE
14 years 3 months ago
Privacy-aware presence management in instant messaging systems
Information about online presence allows participants of instant messaging (IM) systems to determine whether their prospective communication partners will be able to answer their ...
Karsten Loesing, Markus Dorsch, Martin Grote, Knut...
WS
2006
ACM
14 years 3 months ago
Location privacy in wireless personal area networks
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the p...
Dave Singelée, Bart Preneel