Sciweavers

58 search results - page 8 / 12
» How Leaky Is an Extractor
Sort
View
NORDSEC
2009
Springer
14 years 4 months ago
Towards True Random Number Generation in Mobile Environments
In our paper, we analyze possibilities to generate true random data in mobile devices such as mobile phones or pocket computers. We show how to extract arguably true random data w...
Jan Bouda, Jan Krhovjak, Vashek Matyas, Petr Svend...
PKC
2007
Springer
160views Cryptology» more  PKC 2007»
14 years 3 months ago
Anonymous Signatures Made Easy
Abstract. At PKC 2006, Yang, Wong, Deng and Wang proposed the notion of anonymous signature schemes where signatures do not reveal the signer’s identity, as long as some parts of...
Marc Fischlin
IWPC
2006
IEEE
14 years 3 months ago
Reverse Engineering Scripting Language Extensions
Software systems are often written in more than one programming language. During development, programmers need to understand not only the dependencies among code in a particular l...
Daniel L. Moise, Kenny Wong, H. James Hoover, Daqi...
DAC
1996
ACM
14 years 1 months ago
Using Articulation Nodes to Improve the Efficiency of Finite-Element based Resistance Extraction
In this paper, we describe how we have improved the efficiency of a finite-element method for interconnect resistance extraction by introducingarticulation nodes in the finiteelem...
Arjan J. van Genderen, N. P. van der Meijs
BIOSIG
2007
170views Biometrics» more  BIOSIG 2007»
13 years 11 months ago
Privacy enhancing technology for a 3D-face recognition system
: 2D Face images are traditionally used in civil governmental applications. An extension from 2D to 3D images will lead to several advantages when setting up automated authenticati...
Xuebing Zhou, Tom A. M. Kevenaar, Emile Kelkboom, ...