There is a natural intuitive match between anonymity and information theory. In particular, the maximal anonymity loss in anonymity protocols can be matched to the information the...
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
St. Edward’s University has developed a web-based Computer Competency Program ensuring one standard of competency for a diverse student population. Over the past decade faculty ...
This paper investigates how to "observe" a planar object being pushed by a finger. The pushing is governed by a nonlinear system that relates through contact the object ...
We show that recent results of Coppersmith, Boneh, Durfee and Howgrave-Graham actually apply in the more general setting of (partially) approximate common divisors. This leads us t...