Sciweavers

3898 search results - page 218 / 780
» On the Bit Extraction Problem
Sort
View
AP2PC
2007
Springer
15 years 4 months ago
Enabling Grassroots Distributed Computing with CompTorrent
This paper describes the operational characteristics of “CompTorrent”, a general purpose distributed computing platform that provides a low entry cost to creating new distribut...
Bradley Goldsmith
DICTA
2007
15 years 4 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
120
Voted
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
15 years 4 months ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov
TIP
2002
92views more  TIP 2002»
15 years 2 months ago
Gradient match and side match fractal vector quantizers for images
In this paper we propose the gradient match fractal vector quantizers (GMFVQs) and the side match fractal vector quantizers (SMFVQs), which are two classes of finite state fractal...
Hsuan T. Chang
PAMI
2007
152views more  PAMI 2007»
15 years 2 months ago
DCT-Based Iris Recognition
—This paper presents a novel iris coding method based on differences of discrete cosine transform (DCT) coefficients of overlapped angular patches from normalized iris images. Th...
Donald M. Monro, Soumyadip Rakshit, Dexin Zhang