Sciweavers

381 search results - page 43 / 77
» Timing attacks on Web privacy
Sort
View
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
13 years 11 months ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
IEEEARES
2008
IEEE
14 years 2 months ago
Assessing the Reliability and Cost of Web and Grid Orchestrations
Unreliability is a characteristic feature of web and grid based computation: a call to a web or grid site may or may not succeed. An orchestration manager aims to control web or g...
Alan Stewart, Maurice Clint, Terry Harmer, Peter K...
ICDE
2010
IEEE
359views Database» more  ICDE 2010»
14 years 7 months ago
Policy-Aware Sender Anonymity in Location Based Services
Sender anonymity in location-based services (LBS) attempts to hide the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. &...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
ACSAC
2007
IEEE
14 years 2 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
CCS
2007
ACM
14 years 1 months ago
On the accuracy of decentralized virtual coordinate systems in adversarial networks
Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all ...
David John Zage, Cristina Nita-Rotaru