Sciweavers

268 search results - page 46 / 54
» An Analysis of Bitstate Hashing
Sort
View
ADT
2010
13 years 9 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
ECCC
2006
77views more  ECCC 2006»
13 years 9 months ago
Extractors and condensers from univariate polynomials
We give new constructions of randomness extractors and lossless condensers that are optimal to within constant factors in both the seed length and the output length. For extractor...
Venkatesan Guruswami, Christopher Umans, Salil P. ...
COMPUTER
2007
123views more  COMPUTER 2007»
13 years 9 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar
TASLP
2008
136views more  TASLP 2008»
13 years 9 months ago
Distortion Estimation in Compressed Music Using Only Audio Fingerprints
Abstract--An audio fingerprint is a compact yet very robust representation of the perceptually relevant parts of an audio signal. It can be used for content-based audio identificat...
Peter Jan O. Doets, Reginald L. Lagendijk
TKDE
2008
178views more  TKDE 2008»
13 years 9 months ago
Efficient Similarity Search over Future Stream Time Series
With the advance of hardware and communication technologies, stream time series is gaining ever-increasing attention due to its importance in many applications such as financial da...
Xiang Lian, Lei Chen 0002