Sciweavers

2253 search results - page 435 / 451
» Computing with Realizational Morphology
Sort
View
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 4 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
FCCM
2006
IEEE
195views VLSI» more  FCCM 2006»
14 years 3 months ago
A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2)
This paper presents a hardware-optimized variant of the well-known Gaussian elimination over GF(2) and its highly efficient implementation. The proposed hardware architecture, we...
Andrey Bogdanov, M. C. Mertens
ICNP
2006
IEEE
14 years 3 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
ICNP
2006
IEEE
14 years 3 months ago
Characterizing and Mitigating Inter-domain Policy Violations in Overlay Routes
— The Internet is a complex structure arising from the interconnection of numerous autonomous systems (AS), each exercising its own administrative policies to reflect the commer...
Srinivasan Seetharaman, Mostafa H. Ammar
LCN
2006
IEEE
14 years 3 months ago
Exploiting Rate Diversity for Multicasting in Multi-Radio Wireless Mesh Networks
: A multi-rate capable IEEE 802.11a/b/g node can utilize different link-layer transmission rates. Interestingly, multi-rate capability is defined by IEEE 802.11 standards only for...
Junaid Qadir, Chun Tung Chou, Archan Misra