Sciweavers

189 search results - page 27 / 38
» Leakage-Resilient Zero Knowledge
Sort
View
GLOBECOM
2008
IEEE
14 years 4 months ago
Transmitter-Based Minimization of Error Rates in the Downlink of Wireless Systems
—Using CDMA technology, one has to contend with interference in frequency-selective channels caused by multipath propagation and fading. Transmitter-based methods such as Zero Fo...
Fred Richter, Andreas Fischer, René Habendo...
MOBIMEDIA
2007
13 years 11 months ago
Implementation aspects of a delegation system
In this paper we simulate an authorization and delegation system using knowledge based technology. This proposal is part of a visual tool that is intended to be an implementation ...
Isaac Agudo, Javier Lopez, José A. Monteneg...
TCC
2012
Springer
245views Cryptology» more  TCC 2012»
12 years 5 months ago
Secure Two-Party Computation with Low Communication
We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the ...
Ivan Damgård, Sebastian Faust, Carmit Hazay
PIMRC
2008
IEEE
14 years 4 months ago
On the secrecy capacity of frequency-selective fading channels : A practical vandermonde precoding
We study the secrecy capacity of the frequency-selective wiretap channel. Assuming that a guard interval of L symbols is inserted to avoid the inter-block interference and these s...
Mari Kobayashi, Mérouane Debbah
IROS
2006
IEEE
100views Robotics» more  IROS 2006»
14 years 3 months ago
Gait Generation for Passive Running via Iterative Learning Control
Abstract— This paper proposes a novel framework to generate optimal passive gait trajectories for a planar one-legged hopping robot via iterative learning control. The proposed m...
Satoshi Satoh, Kenji Fujimoto, Sang-Ho Hyon