Sciweavers

2237 search results - page 69 / 448
» On the Security of Random Sources
Sort
View
SIGSOFT
2009
ACM
15 years 11 months ago
MSeqGen: object-oriented unit-test generation via mining source code
An objective of unit testing is to achieve high structural coverage of the code under test. Achieving high structural coverage of object-oriented code requires desirable method-ca...
Suresh Thummalapenta, Tao Xie, Nikolai Tillmann, J...
KBSE
2005
IEEE
15 years 10 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
SIGPRO
2002
91views more  SIGPRO 2002»
15 years 4 months ago
Comparison of maximum entropy and minimal mutual information in a nonlinear setting
In blind source separation (BSS), two di erent separation techniques are mainly used: minimal mutual information (MMI), where minimization of the mutual output information yields ...
Fabian J. Theis, Christoph Bauer, Elmar Wolfgang L...
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
15 years 8 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...
INDOCRYPT
2005
Springer
15 years 10 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov