Sciweavers

3 search results - page 1 / 1
» On the Analysis of Caches with Pending Interest Tables
Sort
View
IMA
2009
Springer
221views Cryptology» more  IMA 2009»
14 years 4 months ago
Cache Timing Analysis of LFSR-Based Stream Ciphers
Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated ag...
Gregor Leander, Erik Zenner, Philip Hawkes
INFOCOM
1992
IEEE
14 years 2 months ago
An Assessment of State and Lookup Overhead in Routers
The current Internet is based on a stateless (datagram) architecture. However, many recent proposals rely on the maintenance of state information within network routers, leading t...
Deborah Estrin, Danny J. Mitzel
ISI
2006
Springer
13 years 10 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...