• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 64
Next 10 →

Unifying leakage models: from probing attacks to noisy leakage. Cryptology ePrint Archive, Report 2014/079

by Re Duc, Stefan Dziembowski, Sebastian Faust , 2014
"... Abstract. A recent trend in cryptography is to formally show the leakage resilience of crypto-graphic implementations in a given leakage model. One of the most prominent leakage models – the so-called bounded leakage model – assumes that the amount of leakage is a-priori bounded. Unfortunately, it h ..."
Abstract - Cited by 14 (3 self) - Add to MetaCart
Abstract. A recent trend in cryptography is to formally show the leakage resilience of crypto-graphic implementations in a given leakage model. One of the most prominent leakage models – the so-called bounded leakage model – assumes that the amount of leakage is a-priori bounded. Unfortunately

Active Mask Framework for Segmentation of Fluorescence Microscope Images

by Gowri Srinivasa, Advisor Prof, Prof Matthew, C. Fickus, Prof Adam, D. Linstedt, Prof Robert, F. Murphy
"... m]]l]]s¶D]]¿÷mB]iv]b]oD]m¶¨]iv]§]iv]r]j]t¿rv]]irj]]t]]m] / | ap]]r¿]ÎNy]s¶D]]mb¶r]ix} Û]Ix]]rd]mb]} p—N]t]o%ism] in]ty]m] / || Û]Is]¡uÎc]rN]]riv]nd]p]*N]m]st¶ I always bow to Śri ̄ Śāradāmbā, the limitless ocean of the nectar of compassion, who bears a rosary, a vessel of nectar, the symbol of ..."
Abstract - Add to MetaCart
of knowledge and a book in Her lotus hands. Dedicated to the Lotus Feet of the revered Sadguru. This thesis presents a new active mask (AM) framework and an algorithm for segmenta-tion of digital images, particularly those of punctate patterns from fluorescence microscopy. Fluorescence microscopy has greatly

APractical Lattice-based Digital Signature Schemes

by unknown authors
"... Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case o ..."
Abstract - Add to MetaCart
Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case

Minimum Variance Estimation of a Sparse Vector Within the Linear Gaussian Model: An

by Zvika Ben-haim, Yonina C. Eldar
"... Abstract — We consider minimum variance estimation within the sparse linear Gaussian model (SLGM). A sparse vector is to be estimated from a linearly transformed version embedded in Gaussian noise. Our analysis is based on the theory of reproducing kernel Hilbert spaces (RKHS). After a characterizat ..."
Abstract - Add to MetaCart
Abstract — We consider minimum variance estimation within the sparse linear Gaussian model (SLGM). A sparse vector is to be estimated from a linearly transformed version embedded in Gaussian noise. Our analysis is based on the theory of reproducing kernel Hilbert spaces (RKHS). After a

Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?

by Jorge Guajardo, Bart Mennink
"... Abstract. Based on re-keying techniques by Abdalla, Bellare, and Borst [1, 2], we consider two black-box secure block cipher based symmetric encryption schemes, which we prove secure in the physically observable cryptography model. They are proven side-channel secure against a strong type of adversa ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. Based on re-keying techniques by Abdalla, Bellare, and Borst [1, 2], we consider two black-box secure block cipher based symmetric encryption schemes, which we prove secure in the physically observable cryptography model. They are proven side-channel secure against a strong type

22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements

by Gutachten Alej, Ro Buchmann
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract - Add to MetaCart
serious alternative. This work analyzes the implementation of both a client-server and a peer-to-peer networking model for the prototype shooter game Planet π4. Initially, a survey introduces recent academic approaches to peer-to-peer systems specifically designed for games. Of those, one system

Memory Allocation Algorithms

by Daniel S. Hirschberg , 1972
"... identify all the kinds of storage which the supervisor implements. This class of channels will not be considered further. The following simple principle is sufficient to block all legitimate and covert channels. Masking: A program to be confined must allow its caller to determine all its inputs into ..."
Abstract - Add to MetaCart
into legitimate and covert channels. We say that the channels are masked by the caller. At first sight it seems absurd to allow the customer to determine the bill, but since the service has the right to reject the call, this scheme is an exact model of the purchase order system used for industrial procurement

1 Minimum Variance Estimation of a Sparse Vector within the Linear Gaussian Model:

by Alexander Junga (corresponding, Zvika Ben-haimc, Yonina C. Eldard
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

A stochastic modeling methodology based on weighted Wiener chaos and Malliavin calculus,

by Xiaoliang Wan , Boris Rozovskii , George Em Karniadakis - Proc. Natl. Acad. Sci. USA , 2009
"... In many stochastic partial differential equations (SPDEs) involving random coefficients, modeling the randomness by spatial white noise may lead to ill-posed problems. Here we consider an elliptic problem with spatial Gaussian coefficients and present a methodology that resolves this issue. It is b ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
developed an efficient numerical method for solving second-order elliptic SPDEs with Gaussian coefficients. We introduced the concept of "stochastic convolution model" and employed Malliavin calculus to implement it. The stochastic solution was represented by a weighted WCE in the appropriate norm

Chapter 1 Stabilization and Control over Gaussian Networks

by Ali A. Zaidi, Tobias J. Oechtering, Serdar Yüksel, Mikael Skoglund
"... Abstract We provide an overview and some recent results on real-time communication and control over Gaussian channels. In particular, the problem of remote stabilization of linear systems driven by Gaussian noise over Gaussian relay channels is considered. Necessary and sufficient conditions for mea ..."
Abstract - Add to MetaCart
consider the design of low-delay sensing and transmit schemes for real-time communication. 1.1
Next 10 →
Results 1 - 10 of 64
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University