Sciweavers

139 search results - page 10 / 28
» Cryptographic Randomized Response Techniques
Sort
View
NSDI
2007
14 years 5 days ago
Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks
Many existing peer-to-peer content distribution networks (CDNs) such as Na Kika, CoralCDN, and CoDeeN are deployed on PlanetLab, a relatively trusted environment. But scaling them...
Nikolaos Michalakis, Robert Soulé, Robert G...
ENGL
2007
109views more  ENGL 2007»
13 years 9 months ago
A Proposed Method for Reliability Analysis in Higher Dimension
— In this paper, a new method is proposed to evaluate the reliability of stochastic mechanical systems. This technique is based on the combination of the probabilistic transforma...
S. Kadry
ACMDIS
2006
ACM
14 years 1 months ago
Randomness as a resource for design
Randomness is being harnessed in the design of some interactive systems. This is observed in random blogs, random web searching, and in particular Apple's iPod Shuffle. Yet t...
Tuck Wah Leong, Frank Vetere, Steve Howard
HOST
2009
IEEE
14 years 1 months ago
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage
A PUF or Physical Unclonable Function is a function that is embodied in a physical structure that consists of many random uncontrollable components which originate from process var...
Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schelleke...
DAC
2010
ACM
14 years 1 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic