Sciweavers

393 search results - page 41 / 79
» Interference Channels with Common Information
Sort
View
HICSS
2000
IEEE
156views Biometrics» more  HICSS 2000»
14 years 3 days ago
Medical Portals: Web-based Access to Medical Information
Public portals, such as Web search engines, have been available for a number of years and corporate portals that facilitate access to enterprise information within a company, norm...
Michael A. Shepherd, David Zitner, Carolyn R. Watt...
CISS
2007
IEEE
14 years 2 months ago
Correlated Sources over an Asymmetric Multiple Access Channel with One Distortion Criterion
Abstract— We consider transmission of two arbitrarily correlated sources over a discrete memoryless asymmetric multiple access channel, where one of the sources is available at b...
Deniz Gündüz, Elza Erkip
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 5 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
ICC
2009
IEEE
169views Communications» more  ICC 2009»
14 years 2 months ago
Protocols and Resource Allocation for the Two-Way Relay Channel with Half-Duplex Terminals
—The two-way relay channel (TWRC) describes the communication between two terminals sharing a common relay. In this work we compare different protocols for the TWRC with a half-d...
Adrian Agustin, Josep Vidal, Olga Muñoz
ICCSA
2004
Springer
14 years 1 months ago
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks
In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the...
Hoon Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moo...