Login / Signup

End-to-end automated cache-timing attack driven by machine learning.

Thomas PerianinSébastien CarréVictor DyserynAdrien FaconSylvain Guilley
Published in: J. Cryptogr. Eng. (2021)
Keyphrases
  • end to end
  • machine learning
  • congestion control
  • multipath
  • wireless ad hoc networks
  • admission control
  • high bandwidth
  • real world
  • ad hoc networks
  • application layer
  • transport layer