Sciweavers

3898 search results - page 179 / 780
» On the Bit Extraction Problem
Sort
View
AVBPA
2005
Springer
240views Biometrics» more  AVBPA 2005»
15 years 8 months ago
Practical Biometric Authentication with Template Protection
Abstract. In this paper we show the feasibility of template protecting biometric authentication systems. In particular, we apply template protection schemes to fingerprint data. T...
Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevena...
DATE
2002
IEEE
135views Hardware» more  DATE 2002»
15 years 7 months ago
Reducing Test Application Time Through Test Data Mutation Encoding
In this paper we propose a new compression algorithm geared to reduce the time needed to test scan-based designs. Our scheme compresses the test vector set by encoding the bits th...
Sherief Reda, Alex Orailoglu
CRYPTO
1994
Springer
104views Cryptology» more  CRYPTO 1994»
15 years 7 months ago
Cryptographic Randomness from Air Turbulence in Disk Drives
Abstract. A computer disk drive's motor speed varies slightly but irregularly, principally because of air turbulence inside the disk's enclosure. The unpredictability of ...
Don Davis, Ross Ihaka, Philip Fenstermacher
CSFW
2010
IEEE
15 years 6 months ago
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
—We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding, the state-of-the art...
Boris Köpf, Geoffrey Smith
147
Voted
INFORMATICALT
2006
364views more  INFORMATICALT 2006»
15 years 2 months ago
A Copyright Protection using Watermarking Algorithm
In this paper, a digital watermarking algorithm for copyright protection based on the concept of embed digital watermark and modifying frequency coefficients in discrete wavelet tr...
Aboul Ella Hassanien