Sciweavers

58 search results - page 2 / 12
» How Leaky Is an Extractor
Sort
View
109
Voted
OHS
2001
Springer
15 years 7 months ago
Auld Leaky: A Contextual Open Hypermedia Link Server
The work of the Open Hypermedia Systems Working Group (OHSWG) has lead to the creation of several hypermedia models and a common protocol for Navigational Hypertext. However none o...
Danius T. Michaelides, David E. Millard, Mark J. W...
155
Voted
IACR
2011
88views more  IACR 2011»
14 years 2 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...
83
Voted
EUROCRYPT
2004
Springer
15 years 8 months ago
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis, Leonid Reyzin, Adam Smith
157
Voted
FOCS
2009
IEEE
15 years 9 months ago
Extracting Correlations
Abstract— Motivated by applications in cryptography, we consider a generalization of randomness extraction and the related notion of privacy amplification to the case of two cor...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
148
Voted
KCAP
2011
ACM
14 years 5 months ago
An analysis of open information extraction based on semantic role labeling
Open Information Extraction extracts relations from text without requiring a pre-specified domain or vocabulary. While existing techniques have used only shallow syntactic featur...
Janara Christensen, Mausam, Stephen Soderland, Ore...