Sciweavers

4332 search results - page 139 / 867
» A Probabilistic Identification Result
Sort
View
CCS
2007
ACM
14 years 2 months ago
Covert channels in privacy-preserving identification systems
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags)...
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
Secure Identification and QKD in the Bounded-Quantum-Storage Model
We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
14 years 2 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
ECCV
2004
Springer
14 years 1 months ago
Approximate Confidence Intervals for Estimation of Matching Error Rates of Biometric Identification Devices
Abstract. Assessing the matching error rates of a biometric identification devices is integral to understanding its performance. Here we propose and evaluate several methods for cr...
Travis J. Atkinson, Michael E. Schuckers
BMCBI
2008
144views more  BMCBI 2008»
13 years 10 months ago
PDTD: a web-accessible protein database for drug target identification
Background: Target identification is important for modern drug discovery. With the advances in the development of molecular docking, potential binding proteins may be discovered b...
Zhenting Gao, Honglin Li, Hailei Zhang, Xiaofeng L...