메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2454-2462

Delay optimal policies offer very little privacy

Author keywords

[No Author keywords available]

Indexed keywords

DELAY-OPTIMAL; ESTIMATION ERRORS; EVENT SCHEDULER; FIRST-COME-FIRST-SERVED; PRIVACY METRIC; ROUND-ROBIN SCHEDULING; SCHEDULING POLICIES; USAGE PATTERNS;

EID: 84883069703     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2013.6567051     Document Type: Conference Paper
Times cited : (8)

References (15)
  • 6
    • 79959957319 scopus 로고    scopus 로고
    • Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems
    • K. Zhang and X. Wang, "Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems," in USENIX Security, 2009.
    • (2009) USENIX Security
    • Zhang, K.1    Wang, X.2
  • 8
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • D. Brumley and D. Boneh, "Remote timing attacks are practical," Computer Networks, vol. 48, no. 5, pp. 701-716, 2005.
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 10
    • 0026223925 scopus 로고
    • Round-robin scheduling for max-min fairness in data networks
    • sep
    • E. Hahne, "Round-robin scheduling for max-min fairness in data networks," Selected Areas in Communications, IEEE Journal on, vol. 9, pp. 1024 -1039, sep 1991.
    • (1991) Selected Areas in Communications, IEEE Journal on , vol.9 , pp. 1024-1039
    • Hahne, E.1
  • 11
    • 84883123452 scopus 로고    scopus 로고
    • R. G. Gallager, Poisson Processes, class notes, available online at http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/ 6-262-discrete-stochastic-processes-spring-2011/course-notes/MIT6-262S11-chap02. pdf .
    • Poisson Processes, Class Notes
    • Gallager, R.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.