This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Stand-alone threading libraries lack sophisticated memory management techniques. In this paper, we present a methodology that allows threading libraries that implement non-preempti...
Discovering patterns or frequent episodes in transactions is an important problem in data-mining for the purpose of infering deductive rules from them. Because of the huge size of...
Abstract— In order to efficiently use Grid resources, users or middlewares must use some network information, and in particular some knowledge of the platform network. As such kn...
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...