Sciweavers

54 search results - page 7 / 11
» Cache Based Remote Timing Attack on the AES
Sort
View
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
13 years 11 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
IJNSEC
2008
164views more  IJNSEC 2008»
13 years 7 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau
VTC
2008
IEEE
117views Communications» more  VTC 2008»
14 years 1 months ago
Remote Medical Monitoring Through Vehicular Ad Hoc Network
Several diseases and medical conditions require constant monitoring of physiological signals and vital signs on daily bases, such as diabetics, hypertension and etc. In order to m...
Hyduke Noshadi, Eugenio Giordano, Hagop Hagopian, ...
ICDE
1997
IEEE
133views Database» more  ICDE 1997»
14 years 8 months ago
Physical Database Design for Data Warehouses
Data warehouses collect copies of information from remote sources into a single database. Since the remote data is cached at the warehouse, it appears as local relations to the us...
Wilburt Labio, Dallan Quass, Brad Adelberg
WWW
2005
ACM
14 years 8 months ago
XQuery containment in presence of variable binding dependencies
Semantic caching is an important technology for improving the response time of future user queries specified over remote servers. This paper deals with the fundamental query conta...
Li Chen, Elke A. Rundensteiner