Sciweavers

2237 search results - page 92 / 448
» On the Security of Random Sources
Sort
View
ICA
2007
Springer
15 years 11 months ago
Modeling and Estimation of Dependent Subspaces with Non-radially Symmetric and Skewed Densities
We extend the Gaussian scale mixture model of dependent subspace source densities to include non-radially symmetric densities using Generalized Gaussian random variables linked by ...
Jason A. Palmer, Kenneth Kreutz-Delgado, Bhaskar D...
CCS
2006
ACM
15 years 8 months ago
Measuring the attack surfaces of two FTP daemons
Software consumers often need to choose between different software that provide the same functionality. Today, security is a quality that many consumers, especially system adminis...
Pratyusa K. Manadhata, Jeannette M. Wing, Mark Fly...
120
Voted
SP
2009
IEEE
15 years 11 months ago
Sphinx: A Compact and Provably Secure Mix Format
Sphinx is a cryptographic message format used to relay anonymized messages within a mix network. It is more compact than any comparable scheme, and supports a full set of security...
George Danezis, Ian Goldberg
CIC
2006
121views Communications» more  CIC 2006»
15 years 6 months ago
Performance Studies of a Coding Scheme for a Slepian-Wolf Source Network
- We investigate the simplest Slepian-Wolf source network, consisting of an information source correlated with a second source used as a side-information for the decoder but not th...
Azizuddin Abdul Aziz, John C. Kieffer
132
Voted
LISA
2000
15 years 6 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick