Sciweavers

901 search results - page 141 / 181
» On Anonymization of String Data
Sort
View
ICIP
2010
IEEE
14 years 11 months ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...
NAR
2011
236views Computer Vision» more  NAR 2011»
14 years 4 months ago
The catfish genome database cBARBEL: an informatic platform for genome biology of ictalurid catfish
The catfish genome database, cBARBEL (abbreviated from catfish Breeder And Researcher Bioinformatics Entry Location) is an online open-access database for genome biology of ictalu...
Jianguo Lu, Eric Peatman, Qing Yang, Shaolin Wang,...
SIGSOFT
2003
ACM
16 years 2 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
16 years 1 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
ICFP
2008
ACM
16 years 1 months ago
Quotient lenses
There are now a number of bidirectional programming languages, where every program can be read both as a forward transformation mapping one data structure to another and as a reve...
J. Nathan Foster, Alexandre Pilkiewicz, Benjamin C...