Sciweavers

139 search results - page 11 / 28
» Cryptographic Randomized Response Techniques
Sort
View
EUROCRYPT
2005
Springer
15 years 6 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
VTS
2002
IEEE
120views Hardware» more  VTS 2002»
15 years 5 months ago
Software-Based Weighted Random Testing for IP Cores in Bus-Based Programmable SoCs
We present a software-based weighted random pattern scheme for testing delay faults in IP cores of programmable SoCs. We describe a method for determining static and transition pr...
Madhu K. Iyer, Kwang-Ting Cheng
110
Voted
SODA
2000
ACM
114views Algorithms» more  SODA 2000»
15 years 2 months ago
Typical random 3-SAT formulae and the satisfiability threshold
: k-SAT is one of the best known among a wide class of random constraint satisfaction problems believed to exhibit a threshold phenomenon where the control parameter is the ratio, ...
Olivier Dubois, Yacine Boufkhad, Jacques Mandler
COGSCI
2004
75views more  COGSCI 2004»
15 years 16 days ago
Object recognition and Random Image Structure Evolution
We present a technique called Random Image Structure Evolution (RISE) for use in experimental investigations of high-level visual perception. Potential applications of RISE includ...
Javid Sadr, Pawan Sinha
132
Voted
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
15 years 7 months ago
Stochastic Model for Power Grid Dynamics
We introduce a stochastic model that describes the quasistatic dynamics of an electric transmission network under perturbations introduced by random load fluctuations, random rem...
Marian Anghel, Kenneth A. Werley, Adilson E. Motte...