Sciweavers

98 search results - page 13 / 20
» An information theoretic approach for privacy metrics
Sort
View
EUROCRYPT
2009
Springer
16 years 8 days ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
ESORICS
2004
Springer
15 years 5 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
PODC
2005
ACM
15 years 5 months ago
Distance estimation and object location via rings of neighbors
We consider four problems on distance estimation and object location which share the common flavor of capturing global information via informative node labels: low-stretch routin...
Aleksandrs Slivkins
ACISICIS
2010
IEEE
14 years 3 months ago
A Study on Defect Density of Open Source Software
— Open source software (OSS) development is considered an effective approach to ensuring acceptable levels of software quality. One facet of quality improvement involves the dete...
Cobra Rahmani, Deepak Khazanchi
TWC
2008
150views more  TWC 2008»
14 years 11 months ago
Improved iterative detection and achieved throughputs of OFDM systems under imperfect channel estimation
Abstract--Assuming imperfect channel estimation, we propose an improved detector for orthogonal frequency-division multiplexing (OFDM) systems over a frequency-selective fading cha...
Seyed Mohammad Sajad Sadough, Pierre Duhamel