Sciweavers

894 search results - page 112 / 179
» Secure Implementation of Channel Abstractions
Sort
View
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 3 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
CODES
2008
IEEE
14 years 3 months ago
Distributed flit-buffer flow control for networks-on-chip
The combination of flit-buffer flow control methods and latency-insensitive protocols is an effective solution for networks-on-chip (NoC). Since they both rely on backpressure...
Nicola Concer, Michele Petracca, Luca P. Carloni
ISCN
2006
IEEE
14 years 3 months ago
An optimistic fair e-commerce protocol for large e-goods
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want ...
Cagil Can Oniz, Erkay Savas, Albert Levi
ESWS
2004
Springer
14 years 23 days ago
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. T...
Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla,...
RFIDSEC
2010
13 years 7 months ago
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
NFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications for mobile devices are receiving increased interest...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...