Sciweavers

45 search results - page 8 / 9
» Randomized Quicksort and the Entropy of the Random Source
Sort
View
COMPSEC
2004
131views more  COMPSEC 2004»
13 years 5 months ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...
GRAPHICSINTERFACE
2008
13 years 6 months ago
Order and entropy in picture passwords
Previous efforts involving picture-based passwords have not focused on maintaining a measurably high level of entropy. Since password systems usually allow user selection of passw...
Saranga Komanduri, Dugald Ralph Hutchings
GLOBECOM
2009
IEEE
14 years 3 days ago
Multi-Functional Compression with Side Information
Abstract—In this paper, we consider the problem of multifunctional compression with side information. The problem is how we can compress a source X so that the receiver is able t...
Soheil Feizi-Khankandi, Muriel Médard
TSP
2011
165views more  TSP 2011»
13 years 8 days ago
Quaternion ICA From Second-Order Statistics
—This paper addresses the independent component analysis (ICA) of quaternion random vectors. In particular, we focus on the Gaussian case and therefore only consider the quaterni...
Javier Vía, Daniel P. Palomar, Luis Vielva,...
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
14 years 5 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith