Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness
Yanpei Liu;S. C. Draper;A. M. Sayeed.
IEEE Transactions on Information Forensics and Security (2012)
Using Distributed Source Coding to Secure Fingerprint Biometrics
S.C. Draper;A. Khisti;E. Martinian;A. Vetro.
international conference on acoustics, speech, and signal processing (2007)
Biometric based user authentication and data encryption
Stark C. Draper;Ashish Khisti;Emin Martinian;Anthony Vetro.
Side information aware coding strategies for sensor networks
S.C. Draper;G.W. Wornell.
IEEE Journal on Selected Areas in Communications (2004)
Construction of high-girth QC-LDPC codes
Yige Wang;J.S. Yedidia;S.C. Draper.
2008 5th International Symposium on Turbo Codes and Related Topics (2008)
Secure Biometrics: Concepts, Authentication Architectures, and Challenges
S. Rane;Ye Wang;S. C. Draper;P. Ishwar.
IEEE Signal Processing Magazine (2013)
Decomposition Methods for Large Scale LP Decoding
Siddharth Barman;Xishuo Liu;Stark C. Draper;Benjamin Recht.
IEEE Transactions on Information Theory (2013)
Toward Compression of Encrypted Images and Video Sequences
D. Schonberg;S.C. Draper;Chuohao Yeo;K. Ramchandran.
IEEE Transactions on Information Forensics and Security (2008)
Exploitation of Stragglers in Coded Computation
Shahrzad Kiani;Nuwan Ferdinand;Stark C. Draper.
international symposium on information theory (2018)
Feature extraction for a Slepian-Wolf biometric system using LDPC codes
Y. Sutcu;S. Rane;J.S. Yedidia;S.C. Draper.
international symposium on information theory (2008)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: