Sciweavers

10 search results - page 1 / 2
» tr 2011
Sort
View
ASIACRYPT
2011
Springer
12 years 4 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
ECCC
2011
180views ECommerce» more  ECCC 2011»
12 years 11 months ago
Two Comments on Targeted Canonical Derandomizers
We revisit the notion of a targeted canonical derandomizer, introduced in our recent ECCC Report (TR10-135) as a uniform notion of a pseudorandom generator that suffices for yield...
Oded Goldreich
TR
2011
106views more  TR 2011»
12 years 11 months ago
Exploring Complex Systems Aspects of Blackout Risk and Mitigation
Abstract—Electric power transmission systems are a key infrastructure, and blackouts of these systems have major consequences for the economy and national security. Analyses of b...
David E. Newman, Benjamin A. Carreras, Vickie E. L...
ICASSP
2011
IEEE
12 years 8 months ago
Detection of targets embedded in multipath clutter with Time Reversal
—Detection of targets in complex environments is of importance in both radar and sonar applications. Recent work has shown that the use of Time Reversal (TR) techniques improves ...
Nicholas O'Donoughue, Joel Harley, José M. ...