Centrum voor Wiskunde en Informatica

Displaying 1-2 of 2 results

  • White Papers // Feb 2011

    Secure Authentication From a Weak Key, Without Leaking Information

    The authors study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. This problem has recently received considerable attention, with different solutions optimizing different parameters. The authors study the problem...

    Provided By Centrum voor Wiskunde en Informatica

  • White Papers // Jan 2010

    Visualization and Analysis of Large Data Collections: A Case Study Applied to Confocal Microscopy Data

    This paper proposes an approach in which interactive visualization and analysis are combined with batch tools for the processing of large data collections. Large and heterogeneous data collections are difficult to analyze and pose specific problems to interactive visualization. Application of the traditional interactive processing and visualization approaches as well...

    Provided By Centrum voor Wiskunde en Informatica

  • White Papers // Jan 2010

    Visualization and Analysis of Large Data Collections: A Case Study Applied to Confocal Microscopy Data

    This paper proposes an approach in which interactive visualization and analysis are combined with batch tools for the processing of large data collections. Large and heterogeneous data collections are difficult to analyze and pose specific problems to interactive visualization. Application of the traditional interactive processing and visualization approaches as well...

    Provided By Centrum voor Wiskunde en Informatica

  • White Papers // Feb 2011

    Secure Authentication From a Weak Key, Without Leaking Information

    The authors study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. This problem has recently received considerable attention, with different solutions optimizing different parameters. The authors study the problem...

    Provided By Centrum voor Wiskunde en Informatica