Sciweavers

516 search results - page 24 / 104
» Comparing Two Information Flow Security Properties
Sort
View
CCR
2005
64views more  CCR 2005»
13 years 8 months ago
A methodology for studying persistency aspects of internet flows
We focus in this paper on Internet flows, consider their contributions to the overall traffic per time unit or bin, and perform a multi-scale and multi-protocol analysis to explor...
Jörg Wallerich, Holger Dreger, Anja Feldmann,...
AINA
2005
IEEE
14 years 2 months ago
A Technical Comparison of IPSec and SSL
IPSec (IP Security) and SSL (Secure Socket Layer) have been the most robust and most potential tools available for securing communications over the Internet. Both IPSec and SSL ha...
AbdelNasir Alshamsi, Takamichi Saito
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
14 years 24 days ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
JLP
2010
142views more  JLP 2010»
13 years 3 months ago
Relational bytecode correlations
We present a calculus for tracking equality relationships between values through pairs of bytecode programs. The calculus may serve as a certification mechanism for noninterferenc...
Lennart Beringer
ICCS
2004
Springer
14 years 2 months ago
Direct and Homogeneous Numerical Approaches to Multiphase Flows and Applications
We have studied two approaches to the modeling of bubbly and cavitating fluids. The first approach is based on the direct numerical simulation of gas bubbles using the interface ...
Roman Samulyak, Tianshi Lu, Yarema Prykarpatskyy