Author:
Bethea Darrell,Reiter Michael K.
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. McIlroy, M.D.: A killer adversary for quicksort. Software – Practice and Experience 29, 341–344 (1999)
2. Fisk, M., Varghese, G.: Fast content-based packet handling for intrusion detection. Technical Report CS2001-0670, University of California at San Diego (May 2001)
3. Crosby, S.A., Wallach, D.S.: Denial of service via algorithmic complexity attacks. In: Proceedings of the 12th USENIX Security Symposium (August 2003)
4. Lecture Notes in Computer Science;P.C. Kocher,1996
5. Brumley, D., Boneh, D.: Remote timing attacks are practical. Computer Networks: The International Journal of Computer and Telecommunications Networking 48(5), 701–716 (2005)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Skiplist Timing Attack Vulnerability;Lecture Notes in Computer Science;2019
2. More Practical and Secure History-Independent Hash Tables;Computer Security – ESORICS 2016;2016
3. The Power of Evil Choices in Bloom Filters;2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks;2015-06