Sciweavers

261 search results - page 44 / 53
» Efficient Recovery in Harp
Sort
View
USS
2008
14 years 6 days ago
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties wit
We tackle the problem of building privacy-preserving device-tracking systems -- or private methods to assist in the recovery of lost or stolen Internet-connected mobile devices. T...
Thomas Ristenpart, Gabriel Maganis, Arvind Krishna...
WSC
2008
14 years 6 days ago
Heuristics for balancing Operating Room and post-anesthesia resources under uncertainty
The Post-Anesthesia Care Unit (PACU) is a shared resource in the hospital where patients recover from surgery. It is fed by a set of Operating Rooms (OR's) often spanning sev...
Jill H. Iser, Brian T. Denton, Russell E. King
CHES
2008
Springer
135views Cryptology» more  CHES 2008»
13 years 12 months ago
Multiple-Differential Side-Channel Collision Attacks on AES
In this paper, two efficient multiple-differential methods to detect collisions in the presence of strong noise are proposed - binary and ternary voting. After collisions have been...
Andrey Bogdanov
DAS
2008
Springer
13 years 11 months ago
Accurate Alignment of Double-Sided Manuscripts for Bleed-Through Removal
Double-sided manuscripts are often degraded by bleedthrough interference. Such degradation must be corrected to facilitate human perception and machine recognition. Most approache...
Jie Wang, Michael S. Brown, Chew Lim Tan
SICHERHEIT
2008
13 years 11 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...