Sciweavers

2237 search results - page 59 / 448
» On the Security of Random Sources
Sort
View
ICASSP
2011
IEEE
14 years 8 months ago
Performance analysis of a randomly spaced wireless microphone array
A randomly distributed microphone array is considered in this work. In many applications exact design of the array is impractical. The performance of these arrays, characterized b...
Shmulik Markovich Golan, Sharon Gannot, Israel Coh...
ICSM
2003
IEEE
15 years 10 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
CRYPTO
2007
Springer
134views Cryptology» more  CRYPTO 2007»
15 years 11 months ago
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
A public random function is a random function that is accessible by all parties, including the adversary. For example, a (public) random oracle is a public random function {0, 1}...
Ueli M. Maurer, Stefano Tessaro
142
Voted
NORDSEC
2009
Springer
15 years 11 months ago
Towards True Random Number Generation in Mobile Environments
In our paper, we analyze possibilities to generate true random data in mobile devices such as mobile phones or pocket computers. We show how to extract arguably true random data w...
Jan Bouda, Jan Krhovjak, Vashek Matyas, Petr Svend...
CSFW
2002
IEEE
15 years 9 months ago
Probabilistic Analysis of Anonymity
We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of g...
Vitaly Shmatikov