Sciweavers

2421 search results - page 7 / 485
» Message from the Co-Chairs
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Abstract. We propose a novel approach for quantifying a system's resistance to unknown-message side-channel attacks. The approach is based on a measure of the secret informati...
Michael Backes, Boris Köpf
CIKM
2011
Springer
12 years 7 months ago
LogSig: generating system events from raw textual logs
Modern computing systems generate large amounts of log data. System administrators or domain experts utilize the log data to understand and optimize system behaviors. Most system ...
Liang Tang, Tao Li, Chang-Shing Perng
ICDCS
1998
IEEE
13 years 12 months ago
Accelerated Heartbeat Protocols
Heartbeat protocols are used by distributed programs to ensure that if a process in a program terminates or fails, then the remaining processes in the program terminate. We presen...
Mohamed G. Gouda, Tommy M. McGuire
NSDI
2008
13 years 10 months ago
Using Salience Differentials to Making Visual Cues Noticeable
There is a large body of research on how to design user interfaces for systems so as to ensure that important messages from the systems are presented to the user to maximize the p...
Andreas P. Heiner, N. Asokan
FC
2006
Springer
99views Cryptology» more  FC 2006»
13 years 11 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot