Sciweavers

123 search results - page 13 / 25
» Obfuscation for Cryptographic Purposes
Sort
View
CCS
2008
ACM
13 years 9 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
PDPTA
2000
13 years 9 months ago
Parallel Real-Time Cryptography: Beyond Speedup II
The primary purpose of parallel computation is the fast execution of computational tasks that are too slow to perform sequentially. However, it was shown recently that a second eq...
Selim G. Akl, Stefan D. Bruda
USS
2008
13 years 10 months ago
Practical Symmetric Key Cryptography on Modern Graphics Hardware
Graphics processors are continuing their trend of vastly outperforming CPUs while becoming more general purpose. The latest generation of graphics processors have introduced the a...
Owen Harrison, John Waldron
IBMRD
2007
47views more  IBMRD 2007»
13 years 7 months ago
Cell Broadband Engine processor vault security architecture
    Current data protection technologies such as those based on public‐key encryption and broadcast  encryption  focus  on  the  secure  control  and  prote...
Kanna Shimizu, H. Peter Hofstee, John S. Liberty
TCS
2010
13 years 2 months ago
Weak bisimulation for Probabilistic Timed Automata
We are interested in describing timed systems that exhibit probabilistic behaviour. To this purpose, we consider a model of Probabilistic Timed Automata and introduce a concept of ...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...