Results 241 to 250 of about 133,755 (277)
Some of the next articles are maybe not open access.

Caching Encrypted Content Via Stochastic Cache Partitioning

IEEE/ACM Transactions on Networking, 2018
In-network caching is an appealing solution to cope with the increasing bandwidth demand of video, audio, and data transfer over the Internet. Nonetheless, in order to protect consumer privacy and their own business, content providers (CPs) increasingly deliver encrypted content, thereby preventing Internet service providers (ISPs) from employing ...
Andrea Araldo, Gyorgy Dan, Dario Rossi
openaire   +2 more sources

CacheZoom: How SGX Amplifies The Power of Cache Attacks

Workshop on Cryptographic Hardware and Embedded Systems, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
A. Moghimi   +2 more
semanticscholar   +1 more source

Deep-Reinforcement-Learning-Based Optimization for Cache-Enabled Opportunistic Interference Alignment Wireless Networks

IEEE Transactions on Vehicular Technology, 2017
Both caching and interference alignment (IA) are promising techniques for next-generation wireless networks. Nevertheless, most of the existing works on cache-enabled IA wireless networks assume that the channel is invariant, which is unrealistic ...
Ying He   +6 more
semanticscholar   +1 more source

Flush+Flush: A Fast and Stealthy Cache Attack

International Conference on Detection of intrusions and malware, and vulnerability assessment, 2015
Research on cache attacks has shown that CPU caches leak significant information. Proposed detection mechanisms assume that all cache attacks cause more cache hits and cache misses than benign applications and use hardware performance counters for ...
D. Gruss   +3 more
semanticscholar   +1 more source

Cache in the air: exploiting content caching and delivery techniques for 5G systems

IEEE Communications Magazine, 2014
The demand for rich multimedia services over mobile networks has been soaring at a tremendous pace over recent years. However, due to the centralized architecture of current cellular networks, the wireless link capacity as well as the bandwidth of the ...
Xiaofei Wang   +4 more
semanticscholar   +1 more source

Cache Attacks and Countermeasures: The Case of AES

The Cryptographer's Track at RSA Conference, 2006
Dag Arne Osvik, A. Shamir, Eran Tromer
semanticscholar   +1 more source

Cache Attacks on Intel SGX

European Workshop on System Security, 2017
J. Götzfried   +3 more
semanticscholar   +1 more source

ASLR on the Line: Practical Cache Attacks on the MMU

Network and Distributed System Security Symposium, 2017
Ben Gras   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy