Learn More
We propose a new hypothesis for the origin of the major part of non-solar hadronic cosmic rays (CRs) at all energies: highly relativistic, narrowly collimated jets from the birth or collapse of neutron stars (NSs) in our Galaxy accelerate ambient disk and halo matter to CR energies and disperse it in hot spots which they form when they stop in the Galactic(More)
During the several months of the outburst of Mkn 501 in 1997 the source has been monitored in TeV γ-rays with the HEGRA stereoscopic system of imaging atmospheric Cherenkov telescopes. Quite remarkably it turned out that the shapes of the daily γ-ray energy spectra remained essentially stable throughout the entire state of high activity despite dramatic(More)
In this contributionasurvey is presenteda bout thep ossibilitiesa nd difficultiesofacryptographicp rotectiono fb iometric informationf or thep urpose of authentication. Thec rucial role of sufficient informationc ontent of biometric templatesw ill be presented. It will be shownh ow to uset hisa pproach of a cryptographicp rotectiono fb iometrict emplates in(More)
We present the results on the TeV gamma emission from Mkn 501 in 1997 obtained with the stand-alone Cherenkov telescopes CT1 and CT2 (threshold ≥ 1.2 and ≥ 1.0 resp.) of the HEGRA collaboration. The CT1 lightcurve has the most complete coverage of all TeV observations of Mkn 501 in 1997 due to the additional observations made under the presence of(More)
The Trusted Platform Module TPM is a basic but nevertheless very complex security component that can provide the foundations and the root of security for a variety of applications. In contrast to the TPM, other basic security mechanisms like cryptographic algorithms or security protocols have frequently been subject to thorough security analysis and formal(More)
  • Rainer Plaga
  • 2009
This article surveys use cases for cryptographic keys extracted from biometric templates (“biometric keys”). It lays out security considerations that favor uses for the protection of the confidentiality and privacy of biometric information itself. It is further argued that the cryptographic strength of a biometric key is determined by its true information(More)
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We present a detailed security analysis based on es­ timates of the entropy of the DNA data and formal security results. The scheme is shown to be robust and efficient by analysing the(More)
The characteristic novelty of what is generally meant by a " physical unclonable function " (PUF) is precisely defined, in order to supply a firm basis for security evaluations and the proposal of new security mechanisms. A PUF is defined as a hardware device which implements a physical function with an output value that changes with its argument. A PUF can(More)