Sciweavers

586 search results - page 12 / 118
» Witnessing side effects
Sort
View
CCS
2008
ACM
13 years 9 months ago
Deconstructing new cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
ICMCS
2007
IEEE
132views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Client-Side Relevance Feedback Approach for Image Retrieval in Mobile Environment
With the proliferation of handheld devices, the demand of multimedia information retrieval on mobile devices has attracted more attention. A relevance feedback information retriev...
Ning Yu, Kien A. Hua, Danzhou Liu
EUROCRYPT
2009
Springer
14 years 8 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
13 years 11 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
MOBICOM
2010
ACM
13 years 7 months ago
Side channel: bits over interference
Interference is a critical issue in wireless communications. In a typical multiple-user environment, different users may severely interfere with each other. Coordination among use...
Kaishun Wu, Haoyu Tan, Yunhuai Liu, Jin Zhang, Qia...