Sciweavers

2652 search results - page 41 / 531
» When Information Improves Information Security
Sort
View
NIPS
2008
14 years 11 months ago
Spike Feature Extraction Using Informative Samples
This paper presents a new spike feature extraction algorithm that targets real-time spike sorting and facilitates miniaturized microchip implementation. The proposed algorithm has...
Zhi Yang, Qi Zhao, Wentai Liu
IFIPTM
2010
97views Management» more  IFIPTM 2010»
14 years 8 months ago
Securing Class Initialization
Abstract. Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. Although much progre...
Keiko Nakata, Andrei Sabelfeld
IJCAI
2007
14 years 11 months ago
An Information-Theoretic Analysis of Memory Bounds in a Distributed Resource Allocation Mechanism
Multiagent distributed resource allocation requires that agents act on limited, localized information with minimum communication overhead in order to optimize the distribution of ...
Ricardo M. Araujo, Luís C. Lamb
EUROPKI
2007
Springer
15 years 1 months ago
Time Capsule Signature: Efficient and Provably Secure Constructions
Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which allows a signature to bear a (future) time t so that t...
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin ...
CORR
2010
Springer
225views Education» more  CORR 2010»
14 years 9 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...