Sciweavers

58 search results - page 2 / 12
» How Leaky Is an Extractor
Sort
View
OHS
2001
Springer
13 years 9 months ago
Auld Leaky: A Contextual Open Hypermedia Link Server
The work of the Open Hypermedia Systems Working Group (OHSWG) has lead to the creation of several hypermedia models and a common protocol for Navigational Hypertext. However none o...
Danius T. Michaelides, David E. Millard, Mark J. W...
IACR
2011
88views more  IACR 2011»
12 years 4 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...
EUROCRYPT
2004
Springer
13 years 10 months ago
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis, Leonid Reyzin, Adam Smith
FOCS
2009
IEEE
13 years 11 months ago
Extracting Correlations
Abstract— Motivated by applications in cryptography, we consider a generalization of randomness extraction and the related notion of privacy amplification to the case of two cor...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
KCAP
2011
ACM
12 years 7 months ago
An analysis of open information extraction based on semantic role labeling
Open Information Extraction extracts relations from text without requiring a pre-specified domain or vocabulary. While existing techniques have used only shallow syntactic featur...
Janara Christensen, Mausam, Stephen Soderland, Ore...