Sciweavers

3898 search results - page 215 / 780
» On the Bit Extraction Problem
Sort
View
FOCS
2009
IEEE
15 years 10 months ago
2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness
Abstract— We show how to efficiently extract truly random bits from two independent sources of linear min-entropy, under a computational assumption. The assumption we rely on is...
Yael Tauman Kalai, Xin Li, Anup Rao
ASIAN
2004
Springer
180views Algorithms» more  ASIAN 2004»
15 years 8 months ago
Counting by Coin Tossings
Abstract. This text is an informal review of several randomized algorithms that have appeared over the past two decades and have proved instrumental in extracting efficiently quant...
Philippe Flajolet
DAC
2008
ACM
15 years 5 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
BMCBI
2007
209views more  BMCBI 2007»
15 years 3 months ago
SYMBIOmatics: Synergies in Medical Informatics and Bioinformatics - exploring current scientific literature for emerging topics
Background: The SYMBIOmatics Specific Support Action (SSA) is "an information gathering and dissemination activity" that seeks "to identify synergies between the bi...
Dietrich Rebholz-Schuhmann, Graham Cameron, Domini...
ICIP
2006
IEEE
16 years 4 months ago
Towards a Robust Feature-Based Watermarking Scheme
This paper presents a feature-based watermarking scheme which is robust to geometric and common image processing attacks. The improved Harris corner detector is used to find the r...
Jonathan Weinheimer, Xiaojun Qi, Ji Qi