In this paper, we show that two variants of Stern's identification scheme [IEEE Transaction on Information Theory '96] are provably secure against concurrent attack unde...
: Defect classification can improve product quality and motivate process improvement. Several defect classification schemes have been developed and used with good results in softwa...
We investigate error-correcting codes for a the rank-modulation scheme with an application to flash memory devices. In this scheme, a set of n cells stores information in the permu...
Recently K-anonymity has gained popularity as a privacy quantification against linking attacks, in which attackers try to identify a record with values of some identifying attrib...
In the last years several 3D model compression methods for multiresolution applications have been presented, most of them using 3D meshes. Octrees are a natural multiresolution re...