Sciweavers

1518 search results - page 35 / 304
» Cryptographic Test Correction
Sort
View
FC
2010
Springer
163views Cryptology» more  FC 2010»
14 years 2 months ago
A Traceability Attack against e-Passports
Since 2004, many nations have started issuing “e-passports” containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secur...
Tom Chothia, Vitaliy Smirnov
COMCOM
2000
143views more  COMCOM 2000»
13 years 10 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou
ICASSP
2008
IEEE
14 years 5 months ago
Deploying GOOG-411: Early lessons in data, measurement, and testing
We describe our early experience building and optimizing GOOG-411, a fully automated, voice-enabled, business finder. We show how taking an iterative approach to system developme...
Michiel Bacchiani, Françoise Beaufays, Joha...
TCC
2010
Springer
175views Cryptology» more  TCC 2010»
13 years 9 months ago
Obfuscation of Hyperplane Membership
Previous work on program obfuscation gives strong negative results for general-purpose obfuscators, and positive results for obfuscating simple functions such as equality testing (...
Ran Canetti, Guy N. Rothblum, Mayank Varia
AAAI
1994
14 years 7 days ago
Testing Physical Systems
We present a formal theory of model-based testing, an algorithm for test generation based on it, and outline how testing is implemented by a diagnostic engine. The key to making t...
Peter Struss