Sciweavers

2421 search results - page 158 / 485
» Message from the Editor-in-Chief
Sort
View
COMPCON
1994
IEEE
14 years 2 months ago
Low Power Hardware for a High Performance PDA
The first product in the Newton family operates under severe constraints in the areas of performance, cost, heat dissipation, power consumption, scalability, size and weight. This...
Michael Culbert
EUROCRYPT
2007
Springer
14 years 2 months ago
Batch Verification of Short Signatures
Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particul...
Jan Camenisch, Susan Hohenberger, Michael Ø...
CORR
2006
Springer
150views Education» more  CORR 2006»
13 years 10 months ago
An Achievability Result for the General Relay Channel
We consider the general relay channel. For this setup, the best achievability result was derived by Cover and ElGamal, in theorem 6 of their paper from 1979. In this work we apply...
Ron Dabora, Sergio D. Servetto
AMC
2005
121views more  AMC 2005»
13 years 10 months ago
A new key authentication scheme for cryptosystems based on discrete logarithms
Key authentication is very important in private communication and data integrity. Recently, Peinado, Zhang and Kim showed that the LHL scheme is not secure, respectively. From pub...
Zuhua Shao
WDAG
2009
Springer
166views Algorithms» more  WDAG 2009»
14 years 5 months ago
New Bounds for the Controller Problem
The (M, W)-controller, originally studied by Afek, Awerbuch, Plotkin, and Saks, is a basic ted tool that provides an abstraction for managing the consumption of a global resource ...
Yuval Emek, Amos Korman