Sciweavers

4438 search results - page 58 / 888
» On the Distribution of Keys by Hashing
Sort
View
CMS
2003
148views Communications» more  CMS 2003»
15 years 1 months ago
Computation of Cryptographic Keys from Face Biometrics
We outline cryptographic key–computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable f...
Alwyn Goh, David Ngo Chek Ling
IACR
2011
94views more  IACR 2011»
13 years 11 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
PPOPP
2012
ACM
13 years 7 months ago
CPHASH: a cache-partitioned hash table
CPHASH is a concurrent hash table for multicore processors. CPHASH partitions its table across the caches of cores and uses message passing to transfer lookups/inserts to a partit...
Zviad Metreveli, Nickolai Zeldovich, M. Frans Kaas...
IPTPS
2004
Springer
15 years 5 months ago
UsenetDHT: A Low Overhead Usenet Server
UsenetDHT is a system that reduces the storage and bandwidth resources required to run a Usenet server by spreading the burden of data storage across participants. UsenetDHT distr...
Emil Sit, Frank Dabek, James Robertson
SEMWEB
2004
Springer
15 years 5 months ago
Constructing and Querying Peer-to-Peer Warehouses of XML Resources
We present KADOP, a distributed infrastructure for warehousing XML resources in a peer-to-peer framework. KADOP allows users to build a shared, distributed repository of resources...
Serge Abiteboul, Ioana Manolescu, Nicoleta Preda