digital forensics
all_pubs.doc
Quantum Copy-Protection and Quantum Money Scott Aaronson (MIT) | | | Any humor in this talk is completely unintentional.
Oracles Are Subtle But Not Malicious Scott Aaronson University of Waterloo.
Private-Key Quantum Money Scott Aaronson (MIT). Ever since theres been money, thereve been people trying to counterfeit it Previous work on the physics.
MASSIMO FRANCESCHETTI University of California at San Diego Information-theoretic and physical limits on the capacity of wireless networks TexPoint fonts.
Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.
Information Theory For Data Management Divesh Srivastava Suresh Venkatasubramanian 1.
Securing Low-cost RFID Systems: an Unconditionally Secure ...
Slides: A glance at information-geometric signal processing
Somaz Kolahi : Functional Dependencies: Redundancy Analysis and Correcting Violations
A Model Based Approach to Evaluation of the Efficacy of FEC Coding in Combating Network Packet Losses