Sciweavers

2237 search results - page 17 / 448
» On the Security of Random Sources
Sort
View
92
Voted
TIT
2011
93views more  TIT 2011»
14 years 12 months ago
Performance of Statistical Tests for Single-Source Detection Using Random Matrix Theory
Pascal Bianchi, Mérouane Debbah, Mylè...
CCS
2003
ACM
15 years 10 months ago
Randomized instruction set emulation to disrupt binary code injection attacks
Elena Gabriela Barrantes, David H. Ackley, Trek S....
ISSE
2010
14 years 12 months ago
Randomized constraint solvers: a comparative study
Mitsuo Takaki, Diego Cavalcanti, Rohit Gheyi, Juli...
169
Voted
CCS
2010
ACM
15 years 1 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
SPW
2005
Springer
15 years 10 months ago
Enhancing Privacy with Shared Pseudo Random Sequences
Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have...
Jari Arkko, Pekka Nikander, Mats Näslund