Sciweavers

139 search results - page 9 / 28
» Cryptographic Randomized Response Techniques
Sort
View
EMMCVPR
1999
Springer
14 years 2 months ago
Markov Random Field Modelling of fMRI Data Using a Mean Field EM-algorithm
This paper considers the use of the EM-algorithm, combined with mean field theory, for parameter estimation in Markov random field models from unlabelled data. Special attention ...
Markus Svensén, Frithjof Kruggel, D. Yves v...
MICCAI
2009
Springer
14 years 7 months ago
ECOC Random Fields for Lumen Segmentation in Radial Artery IVUS Sequences
The measure of lumen volume on radial arteries can be used to evaluate the vessel response to different vasodilators. In this paper, we present a framework for automatic lumen segm...
Francesco Ciompi, Oriol Pujol, Eduard Ferná...
GLVLSI
2009
IEEE
170views VLSI» more  GLVLSI 2009»
14 years 1 months ago
Physical unclonable function and true random number generator: a compact and scalable implementation
Physical Unclonable Functions (PUF) and True Random Number Generators (TRNG) are two very useful components in secure system design. PUFs can be used to extract chip-unique signat...
Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, P...
CRYPTO
2004
Springer
119views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Security of Random Feistel Schemes with 5 or More Rounds
We study cryptographic attacks on random Feistel schemes. We denote by m the number of plaintext/ciphertext pairs, and by k the number of rounds. In their famous paper [3], M. Luby...
Jacques Patarin
EUROCRYPT
2007
Springer
14 years 4 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...