Sciweavers

1518 search results - page 35 / 304
» Cryptographic Test Correction
Sort
View
96
Voted
FC
2010
Springer
163views Cryptology» more  FC 2010»
15 years 4 months ago
A Traceability Attack against e-Passports
Since 2004, many nations have started issuing “e-passports” containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secur...
Tom Chothia, Vitaliy Smirnov
98
Voted
COMCOM
2000
143views more  COMCOM 2000»
15 years 9 days ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou
ICASSP
2008
IEEE
15 years 7 months ago
Deploying GOOG-411: Early lessons in data, measurement, and testing
We describe our early experience building and optimizing GOOG-411, a fully automated, voice-enabled, business finder. We show how taking an iterative approach to system developme...
Michiel Bacchiani, Françoise Beaufays, Joha...
97
Voted
TCC
2010
Springer
175views Cryptology» more  TCC 2010»
14 years 11 months ago
Obfuscation of Hyperplane Membership
Previous work on program obfuscation gives strong negative results for general-purpose obfuscators, and positive results for obfuscating simple functions such as equality testing (...
Ran Canetti, Guy N. Rothblum, Mayank Varia
90
Voted
AAAI
1994
15 years 1 months ago
Testing Physical Systems
We present a formal theory of model-based testing, an algorithm for test generation based on it, and outline how testing is implemented by a diagnostic engine. The key to making t...
Peter Struss