Sciweavers

104 search results - page 13 / 21
» A secret sharing scheme based on cellular automata
Sort
View
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
14 years 2 months ago
A New Two-Party Identity-Based Authenticated Key Agreement
We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorith...
Noel McCullagh, Paulo S. L. M. Barreto
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
14 years 8 days ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
PAISI
2010
Springer
13 years 6 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
GLOBECOM
2009
IEEE
14 years 3 months ago
The Resource-Optimized Differentially Modulated Hybrid AF/DF Cooperative Cellular Uplink
—In multi-user cellular uplinks cooperating mobiles may share their antennas in order to achieve transmit diversity by formig a virtual antenna array (VAA) in a distributed fashi...
Li Wang, Lajos Hanzo
WCNC
2008
IEEE
14 years 2 months ago
Virtual Partitioning for Connection Admission Control in Cellular/WLAN Interworking
— Wireless wide area networks (WWANs) and wireless local area networks (WLANs) have complementary characteristics which make them suitable to jointly offer an ubiquitous wireless...
Enrique Stevens-Navarro, Vincent W. S. Wong