• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 849
Next 10 →

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

by Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith , 2008
"... We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying mater ..."
Abstract - Cited by 535 (38 self) - Add to MetaCart
, it can be used to reliably reproduce error-prone biometric inputs without incurring the security risk inherent in storing them. We define the primitives to be both formally secure and versatile, generalizing much prior work. In addition, we provide nearly optimal constructions of both primitives

Bandera: Extracting Finite-state Models from Java Source Code

by James C. Corbett, Matthew B. Dwyer, John Hatcliff, Shawn Laubach, Corina S. Pasareanu, Hongjun Zheng - IN PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING , 2000
"... Finite-state verification techniques, such as model checking, have shown promise as a cost-effective means for finding defects in hardware designs. To date, the application of these techniques to software has been hindered by several obstacles. Chief among these is the problem of constructing a fini ..."
Abstract - Cited by 654 (33 self) - Add to MetaCart
finite-state model that approximates the executable behavior of the software system of interest. Current best-practice involves handconstruction of models which is expensive (prohibitive for all but the smallest systems), prone to errors (which can result in misleading verification results

Fuzzy identity-based encryption

by Amit Sahai, Brent Waters - In EUROCRYPT , 2005
"... We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A Fuzzy IBE scheme allows for a private key for an identity, ω, to decrypt a ciphertext encrypted with an identity, ω ′ , ..."
Abstract - Cited by 377 (20 self) - Add to MetaCart
′ , if and only if the identities ω and ω ′ are close to each other as measured by the “set overlap ” distance metric. A Fuzzy IBE scheme can be applied to enable encryption using biometric inputs as identities; the error-tolerance property of a Fuzzy IBE scheme is precisely what allows for the use of biometric

Leaving an Unknown Maze Using an Error-Prone Compass

by Tom Kamphans, Elmar Langetepe , 2006
"... Imagine you are trapped in a maze of caves. All you have is an old rusty compass and barely enough light to read it. How much inaccuracy can you allow to ensure that you can leave the maze? Or you are walking in a maze of hedgerows that are on the whole orthogonal. Can you find the exit by counting ..."
Abstract - Add to MetaCart
left and right turns? We consider the problem of escaping from an unknown polygonal maze under limited resources and errors in inputs and motion. It is well known that the Pledge algorithm always finds a path out of an unknown maze without any means of orientation—provided that such a path exists

On The Error-Prone Substructures for The Binary-Input Ternary-Output Channel and Its Corresponding Exhaustive Search Algorithm

by Gyu Bum , Kyung , Chih-Chun Wang
"... Abstract-The error floor performance of a low-density paritycheck (LDPC) code is highly related to the presence of errorprone substructures (EPSs). In general, existing characterizations of the EPSs are inspired by the LDPC decoding behavior under simple binary erasure channel (BEC) and binary symm ..."
Abstract - Add to MetaCart
are more prone to what types of errors. The proposed algorithm can also be regarded as a unified search method for the existing EPSs such as cycles, codewords, stopping sets, and fully absorbing sets. The proposed methodology is potentially generalizable to the binary-input m-ary output channel.

A comparison of classifiers and document representations for the routing problem

by Hinrich Schütze, David A. Hull, Jan O. Pedersen - ANNUAL ACM CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL - ACM SIGIR , 1995
"... In this paper, we compare learning techniques based on statistical classification to traditional methods of relevance feedback for the document routing problem. We consider three classification techniques which have decision rules that are derived via explicit error minimization: linear discriminant ..."
Abstract - Cited by 196 (2 self) - Add to MetaCart
In this paper, we compare learning techniques based on statistical classification to traditional methods of relevance feedback for the document routing problem. We consider three classification techniques which have decision rules that are derived via explicit error minimization: linear

Personal Identification Based on Iris Texture Analysis

by Li Ma, Tieniu Tan, Senior Member, Yunhong Wang, Dexin Zhang - IEEE Transactions on Pattern Analysis and Machine Intelligence , 2003
"... With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention over the past decade. Iris recognition, as an emerging biometric recognition approach, is becoming a very active topic in both research and practical applications. ..."
Abstract - Cited by 168 (11 self) - Add to MetaCart
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention over the past decade. Iris recognition, as an emerging biometric recognition approach, is becoming a very active topic in both research and practical applications

Keystroke Biometrics with Number-Pad Input

by Roy A. Maxion, Kevin S. Killourhy - 2010 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN) , 2010
"... Keystroke dynamics is the process of identifying individual users on the basis of their typing rhythms, which are in turn derived from the timestamps of key-press and keyrelease events in the keyboard. Many researchers have explored this domain, with mixed results, but few have examined the relative ..."
Abstract - Cited by 11 (2 self) - Add to MetaCart
Keystroke dynamics is the process of identifying individual users on the basis of their typing rhythms, which are in turn derived from the timestamps of key-press and keyrelease events in the keyboard. Many researchers have explored this domain, with mixed results, but few have examined the relatively impoverished territory of digits only, particularly when restricted to using a single finger – which might come into play on an automated teller machine, a mobile phone, a digital telephone dial, or a digital electronic security keypad at a building entrance. In this work, 28 users typed the same 10-digit number, using only the right-hand index finger. Employing statistical machine-learning techniques (random forest), we achieved an unweighted correct-detection rate of 99.97 % with a corresponding false-alarm rate of 1.51%, using practiced 2-of-3 encore typing with outlier handling. This level of accuracy approaches sufficiency for two-factor authentication for passwords or PIN numbers.

Defending against Injection Attacks through Context-Sensitive String Evaluation

by Tadeusz Pietraszek, Chris Vanden Berghe, Chris V, En Berghe - In Recent Advances in Intrusion Detection (RAID , 2005
"... Injection vulnerabilities pose a major threat to application-level security. Some of the more common types are SQL injection, cross-site scripting and shell injection vulnerabilities. Existing methods for defending against injection attacks, that is, attacks exploiting these vulnerabilities, rely he ..."
Abstract - Cited by 138 (0 self) - Add to MetaCart
heavily on the application developers and are therefore error-prone. In this paper we introduce CSSE, a method to detect and prevent injection attacks. CSSE works by addressing the root cause why such attacks can succeed, namely the ad-hoc serialization of user-provided input. It provides a platform

Silhouette analysisbased gait recognition for human identification

by Liang Wang, Tieniu Tan, Senior Member, Huazhong Ning, Weiming Hu - IEEE Transactions on Pattern Analysis and Machine Intelligence , 2003
"... Abstract—Human identification at a distance has recently gained growing interest from computer vision researchers. Gait recognition aims essentially to address this problem by identifying people based on the way they walk. In this paper, a simple but efficient gait recognition algorithm using spatia ..."
Abstract - Cited by 159 (8 self) - Add to MetaCart
) is applied to time-varying distance signals derived from a sequence of silhouette images to reduce the dimensionality of the input feature space. Supervised pattern classification techniques are finally performed in the lower-dimensional eigenspace for recognition. This method implicitly captures
Next 10 →
Results 1 - 10 of 849
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University