Results 1 - 10
of
20,386
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
, 2008
"... We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying mater ..."
Abstract
-
Cited by 535 (38 self)
- Add to MetaCart
We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying
Strong key-insulated signature schemes
"... Signature computation is frequently performed on insecure devices--e.g., mobile phones-- operating in an environment where the private (signing) key is likely to be exposed. Strong key-insulated signature schemes are one way to mitigate the damage done when this occurs. In the key-insulated model ..."
Abstract
-
Cited by 54 (14 self)
- Add to MetaCart
Signature computation is frequently performed on insecure devices--e.g., mobile phones-- operating in an environment where the private (signing) key is likely to be exposed. Strong key-insulated signature schemes are one way to mitigate the damage done when this occurs. In the key-insulated model
Strong keys and functional dependencies in partial database relations
- ICDT
, 2010
"... We study keys and functional dependencies in the context of partial relations that permit null values with the interpre-tation no information. Based on Codd’s principle of entity integrity we propose the class of strong keys over partial database relations. These keys enforce both uniqueness and tot ..."
Abstract
- Add to MetaCart
We study keys and functional dependencies in the context of partial relations that permit null values with the interpre-tation no information. Based on Codd’s principle of entity integrity we propose the class of strong keys over partial database relations. These keys enforce both uniqueness
Consistency of spectral clustering
, 2004
"... Consistency is a key property of statistical algorithms, when the data is drawn from some underlying probability distribution. Surprisingly, despite decades of work, little is known about consistency of most clustering algorithms. In this paper we investigate consistency of a popular family of spe ..."
Abstract
-
Cited by 572 (15 self)
- Add to MetaCart
Consistency is a key property of statistical algorithms, when the data is drawn from some underlying probability distribution. Surprisingly, despite decades of work, little is known about consistency of most clustering algorithms. In this paper we investigate consistency of a popular family
Happiness is everything, or is it? Explorations on the meaning of psychological well-being
, 1989
"... Reigning measures of psychological well-being have little theoretical grounding, despite an extensive literature on the contours of positive functioning. Aspects of well-being derived from this literature (i.e., self-acceptance, positive relations with others, autonomy, environmental mastery, purpos ..."
Abstract
-
Cited by 595 (14 self)
- Add to MetaCart
-esteem, morale, locus of control, depression). Results revealed that positive relations with others, autonomy, purpose in life, and personal growth were not strongly tied to prior assessment indexes, thereby supporting the claim that key aspects of positive functioning have not been represented in the empirical
Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold
, 2002
"... A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes that provide benefits over previous ones in terms of scalability, performance and security. Our first contribution is a ..."
Abstract
-
Cited by 30 (1 self)
- Add to MetaCart
to yield alternative practical schemes with the same security characteristics as SKIE-OT, starting from other IBE schemes such as that of Cocks [14]. Finally, we show that the role of identity-based encryption is not coincidental by proving that IBE is equivalent to (not strongly) key-insulated encryption
In search of how people change: Applications to addictive behaviors
- AMERICAN PSYCHOLOGIST 47
, 1992
"... How people intentionally change addictive behaviors with and without treatment is not well understood by behavioral scientists. This article summarizes research on self-initiated and professionally facilitated change of addictive behaviors using the key transtheoretical constructs of stages and proc ..."
Abstract
-
Cited by 492 (6 self)
- Add to MetaCart
How people intentionally change addictive behaviors with and without treatment is not well understood by behavioral scientists. This article summarizes research on self-initiated and professionally facilitated change of addictive behaviors using the key transtheoretical constructs of stages
Estimating Attributes: Analysis and Extensions of RELIEF
, 1994
"... . In the context of machine learning from examples this paper deals with the problem of estimating the quality of attributes with and without dependencies among them. Kira and Rendell (1992a,b) developed an algorithm called RELIEF, which was shown to be very efficient in estimating attributes. Origi ..."
Abstract
-
Cited by 474 (25 self)
- Add to MetaCart
Introduction This paper deals with the problem of estimating the quality of attributes with strong dependencies to other attributes which seems to be the key issue of machine learning in general. Namely, for particular problems (e.q. parity problems of higher degrees) the discovering of dependencies between
Identity-Based Strong Key-Insulated Signature Without Random Oracles
"... Abstract: It is a worthwhile challenge to deal with the key-exposure problem in identity-based signatures. To deal with this problem, this paper adopts Dodis, et al.’s key-insulation mechanism to identity-based signature scenarios, and proposes an identity-based key-insulated signature scheme. The ..."
Abstract
- Add to MetaCart
. The proposed scheme enjoys two attractive features: (i) it is strong key-insulated; (ii) it is provably secure without random oracles. Key words: key-insulated; identity-based signature; key-exposure; standard model
Results 1 - 10
of
20,386