-
1
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson, "A note on the confinement problem," Commun. ACM, vol. 16, no. 10, pp. 613-615, 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
4
-
-
0026156690
-
Reducing timing channels with fuzzy time
-
IEEE
-
W. M. Hu, "Reducing timing channels with fuzzy time," in IEEE Symposium on Security and Privacy, pp. 8-20, IEEE, 1991.
-
(1991)
IEEE Symposium on Security and Privacy
, pp. 8-20
-
-
Hu, W.M.1
-
6
-
-
77955359942
-
A low-cost side channel traffic analysis attack in packet networks
-
S. Kadloor, X. Gong, N. Kiyavash, T. Tezcan, and N. Borisov, "A low-cost side channel traffic analysis attack in packet networks," in IEEE ICC 2010 - Communication and Information System Security Symposium, (Cape Town, South Africa), 2010.
-
IEEE ICC 2010 - Communication and Information System Security Symposium, (Cape Town, South Africa), 2010
-
-
Kadloor, S.1
Gong, X.2
Kiyavash, N.3
Tezcan, T.4
Borisov, N.5
-
8
-
-
79959957319
-
Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems
-
K. Zhang and X. Wang, "Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems," in USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Zhang, K.1
Wang, X.2
-
9
-
-
34547350876
-
Inferring the source of encrypted HTTP connections
-
ACM Press
-
M. Liberatore and B. N. Levine, "Inferring the source of encrypted HTTP connections," in CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, (New York, NY, USA), pp. 255-263, ACM Press, 2006.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security, (New York, NY, USA)
, pp. 255-263
-
-
Liberatore, M.1
Levine, B.N.2
-
10
-
-
33746053876
-
Privacy vulnerabilities in encrypted HTTP streams
-
G. Bissias, M. Liberatore, D. Jensen, and B. Levine, "Privacy vulnerabilities in encrypted HTTP streams," in Privacy Enhancing Technologies, pp. 1-11, 2006.
-
(2006)
Privacy Enhancing Technologies
, pp. 1-11
-
-
Bissias, G.1
Liberatore, M.2
Jensen, D.3
Levine, B.4
-
11
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
-
IEEE Computer Society
-
C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson, "Spot me if you can: Uncovering spoken phrases in encrypted voip conversations," in SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy, (Washington, DC, USA), pp. 35-49, IEEE Computer Society, 2008.
-
(2008)
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy, (Washington, DC, USA)
, pp. 35-49
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
12
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, (New York, NY, USA), pp. 199-212, ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, (New York, NY, USA)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
13
-
-
18844454571
-
Remote timing attacks are practical
-
D. Brumley and D. Boneh, "Remote timing attacks are practical," Computer Networks, vol. 48, no. 5, pp. 701-716, 2005.
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 701-716
-
-
Brumley, D.1
Boneh, D.2
-
14
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Springer
-
P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Advances in CryptologyCRYPTO96, pp. 104-113, Springer, 1996.
-
(1996)
Advances in CryptologyCRYPTO96
, pp. 104-113
-
-
Kocher, P.1
-
15
-
-
0036715113
-
An Information-Theoretic and Game-Theoretic Study of Timing Channels
-
September
-
J. Giles and B. Hajek, "An Information-Theoretic and Game-Theoretic Study of Timing Channels," IEEE Transactions on Information Theory, vol. 48, pp. 2455-2477, September 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, pp. 2455-2477
-
-
Giles, J.1
Hajek, B.2
-
18
-
-
33747336635
-
The channel capacity of a certain noisy timing channel
-
July
-
I. S. Moskowitz and A. R. Miller, "The channel capacity of a certain noisy timing channel," IEEE Trans. Inform. Theory, vol. 38, pp. 1339-1344, July 1992.
-
(1992)
IEEE Trans. Inform. Theory
, vol.38
, pp. 1339-1344
-
-
Moskowitz, I.S.1
Miller, A.R.2
-
19
-
-
0042474484
-
Internet traffic modeling and future technology implications
-
IEEE Societies, vol.1, march-3 april
-
M. Zukerman, T. Neame, and R. Addie, "Internet traffic modeling and future technology implications," in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 1, pp. 587-596 vol.1, march-3 april 2003.
-
(2003)
INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications
, vol.1
, pp. 587-596
-
-
Zukerman, M.1
Neame, T.2
Addie, R.3
-
20
-
-
0013244904
-
The entropy of a point process
-
J. A. McFadden, "The entropy of a point process," SIAM Journal on Applied Mathematics, vol. 13, no. 4, pp. 988-994, 1965.
-
(1965)
SIAM Journal on Applied Mathematics
, vol.13
, Issue.4
, pp. 988-994
-
-
McFadden, J.A.1
-
22
-
-
0028273691
-
Relations between entropy and error probability
-
jan
-
M. Feder and N. Merhav, "Relations between entropy and error probability," Information Theory, IEEE Transactions on, vol. 40, pp. 259-266, jan 1994.
-
(1994)
Information Theory, IEEE Transactions on
, vol.40
, pp. 259-266
-
-
Feder, M.1
Merhav, N.2
-
25
-
-
84861594498
-
-
class notes, available online at
-
R. G. Gallager, Poisson Processes, class notes, available online at http: //www.rle.mit.edu/ rgallager/documents/6.262ch2Dec10 000.pdf .
-
Poisson Processes
-
-
Gallager, R.G.1
|