Sciweavers

862 search results - page 139 / 173
» Random Information Spread in Networks
Sort
View
ACSAC
2009
IEEE
15 years 6 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
15 years 4 months ago
The Kalman like particle filter: Optimal estimation with quantized innovations/measurements
— We study the problem of optimal estimation using quantized innovations, with application to distributed estimation over sensor networks. We show that the state probability dens...
Ravi Teja Sukhavasi, Babak Hassibi
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 3 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
CORR
2010
Springer
107views Education» more  CORR 2010»
14 years 6 months ago
One-Shot Capacity of Discrete Channels
Shannon defined channel capacity as the highest rate at which there exists a sequence of codes of block length n such that the error probability goes to zero as n goes to infinity....
Rui A. Costa, Michael Langberg, João Barros
IJCINI
2007
125views more  IJCINI 2007»
14 years 11 months ago
A Unified Approach To Fractal Dimensions
The Cognitive Processes of Abstraction and Formal Inferences J. A. Anderson: A Brain-Like Computer for Cognitive Software Applications: the Resatz Brain Project L. Flax: Cognitive ...
Witold Kinsner