-
2
-
-
79959957319
-
Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems
-
K. Zhang and X.F. Wang, "Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems," in USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Zhang, K.1
Wang, X.F.2
-
3
-
-
34547350876
-
Inferring the source of encrypted HTTP connections
-
New York, NY, USA ACM Press
-
Marc Liberatore and Brian N. Levine, "Inferring the source of encrypted HTTP connections," in CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, New York, NY, USA, 2006, pp. 255-263, ACM Press.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 255-263
-
-
Liberatore, M.1
Levine, B.N.2
-
4
-
-
84873158704
-
Website detection using remote traffic analysis
-
Xun Gong, Nikita Borisov, Negar Kiyavash, and Nabil Schear, "Website detection using remote traffic analysis," in Privacy Enhancing Technologies, 2012.
-
(2012)
Privacy Enhancing Technologies
-
-
Gong, X.1
Borisov, N.2
Kiyavash, N.3
Schear, N.4
-
5
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
-
Washington, DC, USA IEEE Computer Society
-
Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, and Gerald M. Masson, "Spot me if you can: Uncovering spoken phrases in encrypted voip conversations," in SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy, Washington, DC, USA, 2008, pp. 35-49, IEEE Computer Society.
-
(2008)
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 35-49
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
6
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA CCS '09 ACM
-
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in Proceedings of the 16th ACM conference on Computer and communications security, New York, NY, USA, 2009, CCS '09, pp. 199-212, ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
7
-
-
0036715113
-
An information-theoretic and game-theoretic study of timing channels
-
September
-
J. Giles and B. Hajek, "An Information-Theoretic and Game-Theoretic Study of Timing Channels," IEEE Transactions on Information Theory, vol. 48, no. 9, pp. 2455-2477, September 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
, pp. 2455-2477
-
-
Giles, J.1
Hajek, B.2
-
9
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Springer
-
P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Advances in CryptologyCRYPTO96. Springer, 1996, pp. 104-113.
-
(1996)
Advances in CryptologyCRYPTO96
, pp. 104-113
-
-
Kocher, P.1
-
11
-
-
33747336635
-
The channel capacity of a certain noisy timing channel
-
July
-
I. S. Moskowitz and A. R. Miller, "The channel capacity of a certain noisy timing channel," IEEE Trans. Inform. Theory, vol. 38, no. 4, pp. 1339-1344, July 1992.
-
(1992)
IEEE Trans. Inform. Theory
, vol.38
, Issue.4
, pp. 1339-1344
-
-
Moskowitz, I.S.1
Miller, A.R.2
-
12
-
-
84858309174
-
Designing router scheduling policies: A privacy perspective
-
IEEE Transactions on april
-
S. Kadloor, Xun Gong, N. Kiyavash, and P. Venkitasubramaniam, "Designing router scheduling policies: A privacy perspective," Signal Processing, IEEE Transactions on, vol. 60, no. 4, pp. 2001-2012, april 2012.
-
(2012)
Signal Processing
, vol.60
, Issue.4
, pp. 2001-2012
-
-
Kadloor, S.1
Gong, X.2
Kiyavash, N.3
Venkitasubramaniam, P.4
-
13
-
-
84861617955
-
Mitigating timing based information leakage in shared schedulers
-
2012 Proceedings IEEE, march
-
S. Kadloor, N. Kiyavash, and P. Venkitasubramaniam, "Mitigating timing based information leakage in shared schedulers," in INFOCOM, 2012 Proceedings IEEE, march 2012, pp. 1044-1052.
-
(2012)
INFOCOM
, pp. 1044-1052
-
-
Kadloor, S.1
Kiyavash, N.2
Venkitasubramaniam, P.3
-
15
-
-
0003794137
-
-
Prentice-Hall, Inc., Englewood Cliffs, N.J.
-
D. P. Bertsekas and R. G. Gallager, Data Networks, Prentice-Hall, Inc., Englewood Cliffs, N.J., 1987.
-
(1987)
Data Networks
-
-
Bertsekas, D.P.1
Gallager, R.G.2
-
16
-
-
84873183809
-
Existence of a delay-privacy trade-off in the design of scheduling policies
-
preparation for a
-
S. Kadloor, N. Kiyavash, and P. Venkitasubramaniam, "Existence of a delay-privacy trade-off in the design of scheduling policies," in in preparation for a journal submission. Available online at www.ifp.illinois.edu/ ~kadloor1/kadloor-itw-extended.pdf.
-
Journal Submission
-
-
Kadloor, S.1
Kiyavash, N.2
Venkitasubramaniam, P.3
-
17
-
-
77950347409
-
A view of cloud computing
-
Apr.
-
Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia, "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
|