Sciweavers

1094 search results - page 156 / 219
» List signature schemes
Sort
View
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
14 years 26 days ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
WIMOB
2008
IEEE
14 years 2 months ago
Authentication in a Multi-access IMS Environment
– The standard ISIM-based authentication mechanism of IMS is only intended for mobile phones and cannot be used for fixed IMS clients on stationary devices without SIM cards. Thi...
Do Van Thanh, Ivar Jørstad, Paal E. Engelst...
LREC
2010
119views Education» more  LREC 2010»
13 years 9 months ago
Towards Improving English-Latvian Translation: A System Comparison and a New Rescoring Feature
This paper presents a comparative study of two alternative approaches to statistical machine translation (SMT) and their application to a task of English-to-Latvian translation. F...
Maxim Khalilov, José A. R. Fonollosa, Ingun...
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 7 months ago
Optimized on Demand Routing Protocol of Mobile Ad Hoc Network
In this paper optimization of DSR is achieved using New Link Cache structure and Source Transparent Route Maintenance Method. The new link cache effectively utilizes the memory by ...
Chinnappan Jayakumar, Chenniappan Chellappan
CORR
2007
Springer
90views Education» more  CORR 2007»
13 years 7 months ago
Rateless coding with partial state information at the decoder
The problem of coding for channels with time-varying state is studied. Two different models are considered: one in which the channel state cannot depend on the transmitted signal,...
Anand D. Sarwate, Michael Gastpar