We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) f...
Wireless LANs (WLANs) have been deployed at a remarkable rate at university campuses, office buildings, airports, hotels, and malls. Providing efficient and reliable wireless comm...
Eric Rozner, Anand Padmanabha Iyer, Yogita Mehta, ...
An important primitive in the hardware implementations of linear DSP transforms is a circuit that can multiply an input value by one of several different preset constants. We prop...
—In this paper, a novel blind channel estimation algorithm for a multiple input multiple output (MIMO) system is described. This algorithm is easier to implement than the previou...
Xia Liu, Marek E. Bialkowski, Shiyang Lu, Hon Tat ...
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...