Sciweavers

139 search results - page 3 / 28
» Cryptographic Randomized Response Techniques
Sort
View
CCS
2008
ACM
14 years 26 days ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
ICAD
2004
14 years 8 days ago
Towards Enhancing Earthquake Response Interpretation Using Sonification
In this paper, we select the application domain of earthquake engineering for utility of sonification, where signals are of random frequency and amplitude content. In particular, ...
Lakshmy Ramaswamy, Tara C. Hutchinson, Falko Kuest...
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
14 years 11 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
COMPSEC
2004
131views more  COMPSEC 2004»
13 years 10 months ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...
ICITS
2009
13 years 8 months ago
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which replaces the required perfect randomness with output distribution of a computat...
Koji Nuida, Goichiro Hanaoka