Results 241 to 250 of about 133,755 (277)
Some of the next articles are maybe not open access.
Caching Encrypted Content Via Stochastic Cache Partitioning
IEEE/ACM Transactions on Networking, 2018In-network caching is an appealing solution to cope with the increasing bandwidth demand of video, audio, and data transfer over the Internet. Nonetheless, in order to protect consumer privacy and their own business, content providers (CPs) increasingly deliver encrypted content, thereby preventing Internet service providers (ISPs) from employing ...
Andrea Araldo, Gyorgy Dan, Dario Rossi
openaire +2 more sources
CacheZoom: How SGX Amplifies The Power of Cache Attacks
Workshop on Cryptographic Hardware and Embedded Systems, 2017In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
A. Moghimi +2 more
semanticscholar +1 more source
IEEE Transactions on Vehicular Technology, 2017
Both caching and interference alignment (IA) are promising techniques for next-generation wireless networks. Nevertheless, most of the existing works on cache-enabled IA wireless networks assume that the channel is invariant, which is unrealistic ...
Ying He +6 more
semanticscholar +1 more source
Both caching and interference alignment (IA) are promising techniques for next-generation wireless networks. Nevertheless, most of the existing works on cache-enabled IA wireless networks assume that the channel is invariant, which is unrealistic ...
Ying He +6 more
semanticscholar +1 more source
Flush+Flush: A Fast and Stealthy Cache Attack
International Conference on Detection of intrusions and malware, and vulnerability assessment, 2015Research on cache attacks has shown that CPU caches leak significant information. Proposed detection mechanisms assume that all cache attacks cause more cache hits and cache misses than benign applications and use hardware performance counters for ...
D. Gruss +3 more
semanticscholar +1 more source
Cache in the air: exploiting content caching and delivery techniques for 5G systems
IEEE Communications Magazine, 2014The demand for rich multimedia services over mobile networks has been soaring at a tremendous pace over recent years. However, due to the centralized architecture of current cellular networks, the wireless link capacity as well as the bandwidth of the ...
Xiaofei Wang +4 more
semanticscholar +1 more source
Cache Attacks and Countermeasures: The Case of AES
The Cryptographer's Track at RSA Conference, 2006Dag Arne Osvik, A. Shamir, Eran Tromer
semanticscholar +1 more source
ASLR on the Line: Practical Cache Attacks on the MMU
Network and Distributed System Security Symposium, 2017Ben Gras +4 more
semanticscholar +1 more source

