• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 20,386
Next 10 →

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

by Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith , 2008
"... We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying mater ..."
Abstract - Cited by 535 (38 self) - Add to MetaCart
We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying

Strong key-insulated signature schemes

by Y. Dodis, et al.
"... Signature computation is frequently performed on insecure devices--e.g., mobile phones-- operating in an environment where the private (signing) key is likely to be exposed. Strong key-insulated signature schemes are one way to mitigate the damage done when this occurs. In the key-insulated model ..."
Abstract - Cited by 54 (14 self) - Add to MetaCart
Signature computation is frequently performed on insecure devices--e.g., mobile phones-- operating in an environment where the private (signing) key is likely to be exposed. Strong key-insulated signature schemes are one way to mitigate the damage done when this occurs. In the key-insulated model

Strong keys and functional dependencies in partial database relations

by Sven Hartmann, Uwe Leck, Sebastian Link - ICDT , 2010
"... We study keys and functional dependencies in the context of partial relations that permit null values with the interpre-tation no information. Based on Codd’s principle of entity integrity we propose the class of strong keys over partial database relations. These keys enforce both uniqueness and tot ..."
Abstract - Add to MetaCart
We study keys and functional dependencies in the context of partial relations that permit null values with the interpre-tation no information. Based on Codd’s principle of entity integrity we propose the class of strong keys over partial database relations. These keys enforce both uniqueness

Consistency of spectral clustering

by Ulrike von Luxburg, Mikhail Belkin, Olivier Bousquet , 2004
"... Consistency is a key property of statistical algorithms, when the data is drawn from some underlying probability distribution. Surprisingly, despite decades of work, little is known about consistency of most clustering algorithms. In this paper we investigate consistency of a popular family of spe ..."
Abstract - Cited by 572 (15 self) - Add to MetaCart
Consistency is a key property of statistical algorithms, when the data is drawn from some underlying probability distribution. Surprisingly, despite decades of work, little is known about consistency of most clustering algorithms. In this paper we investigate consistency of a popular family

Happiness is everything, or is it? Explorations on the meaning of psychological well-being

by Carol D. Ryff , 1989
"... Reigning measures of psychological well-being have little theoretical grounding, despite an extensive literature on the contours of positive functioning. Aspects of well-being derived from this literature (i.e., self-acceptance, positive relations with others, autonomy, environmental mastery, purpos ..."
Abstract - Cited by 595 (14 self) - Add to MetaCart
-esteem, morale, locus of control, depression). Results revealed that positive relations with others, autonomy, purpose in life, and personal growth were not strongly tied to prior assessment indexes, thereby supporting the claim that key aspects of positive functioning have not been represented in the empirical

Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold

by Mihir Bellare, Adriana Palacio , 2002
"... A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes that provide benefits over previous ones in terms of scalability, performance and security. Our first contribution is a ..."
Abstract - Cited by 30 (1 self) - Add to MetaCart
to yield alternative practical schemes with the same security characteristics as SKIE-OT, starting from other IBE schemes such as that of Cocks [14]. Finally, we show that the role of identity-based encryption is not coincidental by proving that IBE is equivalent to (not strongly) key-insulated encryption

In search of how people change: Applications to addictive behaviors

by James O. Prochaska, Carlo C. DiClemente, John C. Norcross - AMERICAN PSYCHOLOGIST 47 , 1992
"... How people intentionally change addictive behaviors with and without treatment is not well understood by behavioral scientists. This article summarizes research on self-initiated and professionally facilitated change of addictive behaviors using the key transtheoretical constructs of stages and proc ..."
Abstract - Cited by 492 (6 self) - Add to MetaCart
How people intentionally change addictive behaviors with and without treatment is not well understood by behavioral scientists. This article summarizes research on self-initiated and professionally facilitated change of addictive behaviors using the key transtheoretical constructs of stages

Estimating Attributes: Analysis and Extensions of RELIEF

by Igor Kononenko , 1994
"... . In the context of machine learning from examples this paper deals with the problem of estimating the quality of attributes with and without dependencies among them. Kira and Rendell (1992a,b) developed an algorithm called RELIEF, which was shown to be very efficient in estimating attributes. Origi ..."
Abstract - Cited by 474 (25 self) - Add to MetaCart
Introduction This paper deals with the problem of estimating the quality of attributes with strong dependencies to other attributes which seems to be the key issue of machine learning in general. Namely, for particular problems (e.q. parity problems of higher degrees) the discovering of dependencies between

Identity-Based Strong Key-Insulated Signature Without Random Oracles

by Weng Jian, Chen Ke-fei, Liu Sheng-li, Li Xiang-xue
"... Abstract: It is a worthwhile challenge to deal with the key-exposure problem in identity-based signatures. To deal with this problem, this paper adopts Dodis, et al.’s key-insulation mechanism to identity-based signature scenarios, and proposes an identity-based key-insulated signature scheme. The ..."
Abstract - Add to MetaCart
. The proposed scheme enjoys two attractive features: (i) it is strong key-insulated; (ii) it is provably secure without random oracles. Key words: key-insulated; identity-based signature; key-exposure; standard model

Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold

by Adriana Palacioy , 2002
"... ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 20,386
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University