Author of the publication

Opportunities and Limits of Remote Timing Attacks.

, , and . ACM Trans. Inf. Syst. Secur., 12 (3): 17:1-17:29 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multicast capacity of large homogeneous multihop wireless networks., and . WiOpt, page 116-124. IEEE, (2008)Connection-level analysis and modeling of network traffic., , and . Internet Measurement Workshop, page 99-103. ACM, (2001)Long-range dependence: now you see it, now you don't!, , and . GLOBECOM, page 2165-2169. IEEE, (2002)Color-based broadcasting for ad hoc networks., , and . WiOpt, page 49-58. IEEE, (2006)Analyzing robot behavior in e-business sites., , , , , and . SIGMETRICS/Performance, page 338-339. ACM, (2001)Measurement based analysis, modeling, and synthesis of the internet delay space., , , , , and . Internet Measurement Conference, page 85-98. ACM, (2006)Describing MANETS: principal component analysis of sparse mobility traces., , , and . PE-WASUN, page 123-131. ACM, (2006)Locating Available Bandwidth Bottlenecks., , and . IEEE Internet Comput., 8 (5): 34-41 (2004)A Cloud data center optimization approach using dynamic data interchanges., , and . CLOUDNET, page 175-179. IEEE, (2013)Bounds on the Benefit of Network Coding for Wireless Multicast and Unicast., and . IEEE Trans. Mob. Comput., 13 (1): 102-115 (2014)