Y Dodis, L Reyzin, A Smith - … : International Conference On The Theory And …, 2004 - Springer
We provide formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely …
We provide formal definitions and efficient secure techniques for turning noisy information into keys usable for any cryptographic application, and, in particular, reliably and securely …
Classification Algorithms for Codes and Designs Page 1 Algorithms and Computation in Mathematics Volume 15 Classification Algorithms for Codes and Designs Classification …
How can one exchange information e? ectively when the medium of com-nication introduces errors? This question has been investigated extensively starting with the seminal works of …
It was recently proposed that humans can discriminate between at least a trillion olfactory stimuli. Here we show that this claim is the result of a fragile estimation framework capable of …
A Schrijver - IEEE Transactions on Information Theory, 2005 - ieeexplore.ieee.org
We give a new upper bound on the maximum size A (n, d) of a binary code of word length n and minimum distance at least d. It is based on block-diagonalizing the Terwilliger algebra …
H Bartz, L Holzbaur, H Liu, S Puchinger… - … and Trends® in …, 2022 - nowpublishers.com
The rank metric measures the distance between two matrices by the rank of their difference. Codes designed for the rank metric have attracted considerable attention in recent years …
PRJ Östergård - Nordic Journal of Computing, 2001 - dl.acm.org
Given a graph, in the maximum clique problem one wants to find the largest number of vertices, any two of which are adjacent. In the maximum-weight clique problem, the vertices …
Broadcast communications is critically important in vehicular networks. Many safety applications need safety warning messages to be broadcast to all vehicles present in an …