Sciweavers

191 search results - page 3 / 39
» Differentially secure multicasting and its implementation me...
Sort
View
P2P
2006
IEEE
119views Communications» more  P2P 2006»
14 years 2 months ago
Defense against Intrusion in a Live Streaming Multicast System
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss ind...
Maya Haridasan, Robbert van Renesse
CIA
2004
Springer
14 years 2 months ago
Design and Implementation of Agent Community Based Peer-to-Peer Information Retrieval Method
This paper presents an agent community based peer-to-peer information retrieval method called ACP2P method[16] and discusses the experimental results of the method. The ACP2P metho...
Tsunenori Mine, Daisuke Matsuno, Akihiro Kogo, Mak...
BMCBI
2005
85views more  BMCBI 2005»
13 years 8 months ago
Processing methods for differential analysis of LC/MS profile data
Background: Liquid chromatography coupled to mass spectrometry (LC/MS) has been widely used in proteomics and metabolomics research. In this context, the technology has been incre...
Mikko Katajamaa, Matej Oresic
WWCA
1998
Springer
14 years 27 days ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
14 years 17 hour ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...