Sciweavers

189 search results - page 32 / 38
» Leakage-Resilient Zero Knowledge
Sort
View
CCR
2000
101views more  CCR 2000»
13 years 9 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
NCA
2002
IEEE
13 years 9 months ago
The Construction of Smooth Models using Irregular Embeddings Determined by a Gamma Test Analysis
One of the key problems in forming a smooth model from input-output data is the determination of which input variables are relevant in predicting a given output. In this paper we ...
Alban P. M. Tsui, Antonia J. Jones, A. Guedes de O...
TROB
2002
101views more  TROB 2002»
13 years 9 months ago
Two solutions to the adaptive visual servoing problem
In this paper, we present two globally convergent vision-based position controllers for a planar two-links manipulator in the so-called fixed-camera configuration, where the camera...
Alessandro Astolfi, Liu Hsu, Mariana S. Netto, Rom...
INFOCOM
2010
IEEE
13 years 8 months ago
A General Algorithm for Interference Alignment and Cancellation in Wireless Networks
—Physical layer techniques have come a long way and can achieve close to Shannon capacity for single pointto-point transmissions. It is apparent that, to further improve network ...
Erran L. Li, Richard Alimi, Dawei Shen, Harish Vis...
GLOBECOM
2009
IEEE
13 years 7 months ago
SC-FDMA Versus OFDMA: Sensitivity to Large Carrier Frequency and Timing Offsets on the Uplink
In this paper, we present a comparison between the sensitivity of SC-FDMA and OFDMA schemes to large carrier frequency offsets (CFO) and timing offsets (TO) of different users on t...
K. Raghunath, Ananthanarayanan Chockalingam