scholarly journals Biometric Identification Systems with Noisy Enrollment for Gaussian Sources and Channels

Entropy ◽  
2021 ◽  
Vol 23 (8) ◽  
pp. 1049
Author(s):  
Vamoua Yachongka ◽  
Hideki Yagi ◽  
Yasutada Oohama

In the present paper, we investigate the fundamental trade-off of identification, secret-key, storage, and privacy-leakage rates in biometric identification systems for remote or hidden Gaussian sources. We use a technique of converting the system to one where the data flow is in one-way direction to derive the capacity region of these rates. Also, we provide numerical calculations of three different examples for the system. The numerical results imply that it seems hard to achieve both high secret-key and small privacy-leakage rates simultaneously.

2010 ◽  
Vol 2 (2) ◽  
pp. 45-50 ◽  
Author(s):  
Hartmut Pasternak ◽  
Gabriel Kubieniec ◽  
Marek Piekarczyk

This study includes a detailed analysis of using adhesives in reinforcement of steel structures. Two types of structures were experimentally investigated: box girder and knee joints. The numerical calculations were done on the basis of the experimental investigations performed at CUT Cracow (box girder) and BTU Cottbus (knee joints) with the use of numerical programme Abaqus based on the Finite Element Method. The numerical results were compared with the experimental ones.


1995 ◽  
Vol 04 (03) ◽  
pp. 625-636 ◽  
Author(s):  
V.R. MANFREDI ◽  
L. SALASNICH

Using a classical analytical criterion (that of curvature) and numerical results (Poincare sections and spectral statistics), a transition order-chaos-order in the roto-vibrational model of atomic nuclei has been shown. Numerical calculations were performed for some deformed nuclei.


2014 ◽  
Vol 556-562 ◽  
pp. 2658-2662 ◽  
Author(s):  
Pu Han Zhang ◽  
Jing Zhe Li ◽  
Shuai Shao ◽  
Peng Wang

The prevalence of Android makes it face the severe security threats from malicious apps. Many Android malware can steal users’ sensitive data and leak them out. The data flow analysis is a popular technique used to detect privacy leakages by tracking the sensitive information flow statically. In practice, an effective data flow analysis should employ inter-procedure information tracking. However, the Android event-driven programming model brings a challenge to construct the call graph (CG) for a target app. This paper presents a method which employs the inter-procedural and context-sensitive data flow analysis to detect privacy leakage in Android apps. To make the analysis accurate, a flow-sensitive and points-to call target analysis is employed to construct and improve the call graph. A prototype system, called PDroid, has been implemented and applied to some real malware. The experiment shows that our method can effective detect the privacy leakages cross multiple method call instances.


Sign in / Sign up

Export Citation Format

Share Document