The Martini Synch: Joint Fuzzy Hashing Via Error Correction
暂无分享,去创建一个
[1] Stefan Lucks,et al. Analysis of the E0 Encryption System , 2001, Selected Areas in Cryptography.
[2] John C. Platt,et al. Distortion discriminant analysis for audio fingerprinting , 2003, IEEE Trans. Speech Audio Process..
[3] Frederik Armknecht. A Linearization Attack on the Bluetooth Key Stream Generator , 2002, IACR Cryptol. ePrint Arch..
[4] Avishai Wool,et al. Cracking the Bluetooth PIN , 2005, MobiSys '05.
[5] Jaap A. Haitsma,et al. Robust Audio Hashing for Content Identification , 2001 .
[6] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[7] Jolyon Clulow,et al. Repairing the Bluetooth Pairing Protocol , 2005, Security Protocols Workshop.
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Elwyn R. Berlekamp,et al. Algebraic coding theory , 1984, McGraw-Hill series in systems science.
[10] Mahmoud Naghshineh,et al. Bluetooth: vision, goals, and architecture , 1998, MOCO.
[11] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[12] Bernt Schiele,et al. Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.
[13] Blake Hannaford,et al. "Are You with Me?" - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person , 2004, Pervasive.
[14] Serge Vaudenay,et al. Faster Correlation Attack on Bluetooth Keystream Generator E0 , 2004, CRYPTO.
[15] Yiannis Aloimonos,et al. Polydioptric camera design and 3D motion estimation , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..
[16] Gregory D. Abowd,et al. Ubicomp 2001: Ubiquitous Computing , 2001, Lecture Notes in Computer Science.
[17] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[18] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[19] Vishal Monga,et al. A clustering based approach to perceptual image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[20] David B. Wilson. Random random walks on ℤ2d , 1997 .
[21] Haim J. Wolfson,et al. Geometric hashing: an overview , 1997 .
[22] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[23] Claude Castelluccia,et al. Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.
[24] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[25] Kannan Ramchandran,et al. Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[26] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[27] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[28] Ken Hinckley,et al. Synchronous gestures for multiple persons and computers , 2003, UIST '03.
[29] Scott Crenshaw. News: Speedy public key cryptography system , 2000 .
[30] Gregory D. Abowd,et al. A gesture-based authentication scheme for untrusted public terminals , 2004, UIST '04.