Sciweavers

2237 search results - page 117 / 448
» On the Security of Random Sources
Sort
View
137
Voted
CODES
2007
IEEE
15 years 11 months ago
A smart random code injection to mask power analysis based side channel attacks
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...
CONCUR
2007
Springer
15 years 11 months ago
Making Random Choices Invisible to the Scheduler
Abstract. When dealing with process calculi and automata which express both nondeterministic and probabilistic behavior, it is customary to introduce the notion of scheduler to res...
Konstantinos Chatzikokolakis, Catuscia Palamidessi
ICIP
2010
IEEE
15 years 3 months ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...
ISMIR
2005
Springer
151views Music» more  ISMIR 2005»
15 years 10 months ago
Markov Random Fields and Maximum Entropy Modeling for Music Information Retrieval
Music information retrieval is characterized by a number of various user information needs. Systems are being developed that allow searchers to find melodies, rhythms, genres, an...
Jeremy Pickens, Costas S. Iliopoulos
JMLR
2010
107views more  JMLR 2010»
14 years 12 months ago
Error-Correcting Ouput Codes Library
In this paper, we present an open source Error-Correcting Output Codes (ECOC) library. The ECOC framework is a powerful tool to deal with multi-class categorization problems. This...
Sergio Escalera, Oriol Pujol, Petia Radeva