Sciweavers

2237 search results - page 244 / 448
» Storing information with extractors
Sort
View
91
Voted
SENSYS
2005
ACM
15 years 6 months ago
CenWits: a sensor-based loosely coupled search and rescue system using witnesses
This paper describes the design, implementation and evaluation of a search and rescue system called CenWits. CenWits uses several small, commonly-available RF-based sensors, and a...
Jyh-How Huang, Saqib Amjad, Shivakant Mishra
79
Voted
STORAGESS
2005
ACM
15 years 6 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
STORAGESS
2005
ACM
15 years 6 months ago
Hydra: a platform for survivable and secure data storage systems
This paper introduces Hydra, a platform that we are developing for highly survivable and secure data storage systems that distribute information over networks and adapt timely to ...
Lihao Xu
ACNS
2005
Springer
116views Cryptology» more  ACNS 2005»
15 years 6 months ago
Two-Server Password-Only Authenticated Key Exchange
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, a...
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban,...
77
Voted
ECAL
2005
Springer
15 years 6 months ago
Self-replication and Evolution of DNA Crystals
Abstract. Is it possible to create a simple physical system that is capable of replicating itself? Can such a system evolve interesting behaviors, thus allowing it to adapt to a wi...
Rebecca Schulman, Erik Winfree