Sciweavers

2237 search results - page 37 / 448
» On the Security of Random Sources
Sort
View
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
15 years 4 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
WDAG
2005
Springer
118views Algorithms» more  WDAG 2005»
15 years 3 months ago
Distributed Computing with Imperfect Randomness
Randomness is a critical resource in many computational scenarios, enabling solutions where deterministic ones are elusive or even provably impossible. However, the randomized solu...
Shafi Goldwasser, Madhu Sudan, Vinod Vaikuntanatha...
MSE
2002
IEEE
198views Hardware» more  MSE 2002»
15 years 2 months ago
BSS: A New Approach for Watermark Attack
Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multi...
Jiang Du, Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho...
SIAMIS
2010
102views more  SIAMIS 2010»
14 years 4 months ago
Cross Correlation and Deconvolution of Noise Signals in Randomly Layered Media
It is known that cross correlation of waves generated by noise sources, propagating in an unknown medium, and recorded by a sensor array, can provide information about the medium. ...
Josselin Garnier, Knut Sølna
70
Voted
TIT
2002
129views more  TIT 2002»
14 years 9 months ago
Arbitrary source models and Bayesian codebooks in rate-distortion theory
-- We characterize the best achievable performance of lossy compression algorithms operating on arbitrary random sources, and with respect to general distortion measures. Direct an...
Ioannis Kontoyiannis, Junshan Zhang