Sciweavers

191 search results - page 12 / 39
» Differentially secure multicasting and its implementation me...
Sort
View
CN
2007
95views more  CN 2007»
13 years 8 months ago
Sampling large Internet topologies for simulation purposes
In this paper, we develop methods to ‘‘sample’’ a small realistic graph from a large Internet topology. Despite recent activity, modeling and generation of realistic graph...
Vaishnavi Krishnamurthy, Michalis Faloutsos, Marek...
CHES
2006
Springer
146views Cryptology» more  CHES 2006»
14 years 14 days ago
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits
This paper presents a Path Swapping (PS) method which enables to enhance the security of Quasi Delay Insensitive Asynchronous Circuits against Power Analysis (PA) attack. This appr...
G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin
CCS
2004
ACM
14 years 2 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields
SACRYPT
2000
Springer
145views Cryptology» more  SACRYPT 2000»
14 years 8 days ago
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e. the same interface specifications as the Advanced...
Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, M...
EDOC
2003
IEEE
14 years 2 months ago
An Extensible Binding Framework for Component-Based Middleware
One of the most significant limitations of current middleware platforms, both commercial and research, is that they typically support only a small, pre-defined, set of fundamental...
Nikos Parlavantzas, Geoff Coulson, Gordon S. Blair