Sciweavers

122 search results - page 16 / 25
» Achieving Security Despite Compromise Using Zero-knowledge
Sort
View
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
15 years 2 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
CODES
2007
IEEE
15 years 3 months ago
HySim: a fast simulation framework for embedded software development
Instruction Set Simulation (ISS) is widely used in system evaluation and software development for embedded processors. Despite the significant advancements in the ISS technology,...
Stefan Kraemer, Lei Gao, Jan Weinstock, Rainer Leu...
IROS
2006
IEEE
274views Robotics» more  IROS 2006»
15 years 3 months ago
Adaptive Scale Robust Segmentation for 2D Laser Scanner
Abstract— This paper presents a robust algorithm for segmentation and line detection in 2D range scans. The described method exploits the multimodal probability density function ...
Ruben Martinez-Cantin, José A. Castellanos,...
70
Voted
USS
2008
14 years 12 months ago
The Practical Subtleties of Biometric Key Generation
The inability of humans to generate and remember strong secrets makes it difficult for people to manage cryptographic keys. To address this problem, numerous proposals have been s...
Lucas Ballard, Seny Kamara, Michael K. Reiter
RIVF
2007
14 years 11 months ago
Stochastic routing in large grid-shaped quantum networks
— This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in Quantum Key Distribution (QKD)-based networks. We develop a realistic QKDbase...
Cuong Le Quoc, Patrick Bellot, Akim Demaille