Sciweavers

516 search results - page 72 / 104
» Comparing Two Information Flow Security Properties
Sort
View
TCC
2005
Springer
102views Cryptology» more  TCC 2005»
14 years 2 months ago
Toward Privacy in Public Databases
Abstract. We initiate a theoretical study of the census problem. Informally, in a census individual respondents give private information to a trusted party (the census bureau), who...
Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam...
ISBI
2006
IEEE
14 years 9 months ago
A diffusion tensor imaging tractography algorithm based on Navier-Stokes fluid mechanics
We introduce a method for estimating regional connectivity in diffusion tensor magnetic resonance imaging (DT-MRI) based on a fluid mechanics model. We customize the Navier-Stokes...
Nathan S. Hageman, David W. Shattuck, Katherine Na...
ISW
2009
Springer
14 years 3 months ago
Nonce Generators and the Nonce Reset Problem
A nonce is a cryptographic input value which must never repeat within a given context. Nonces are important for the security of many cryptographic building blocks, such as stream c...
Erik Zenner
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
14 years 2 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
TASE
2008
IEEE
13 years 8 months ago
Vision-Based Online Process Control in Manufacturing Applications
Applications such as layered manufacturing, or in general, solid free-form fabrication, pose a major challenge on online process control. For these parts to be functional, it is i...
Yuan Cheng, Mohsen A. Jafari