Sciweavers

2702 search results - page 366 / 541
» Message from the Editor
Sort
View
136
Voted
WOTE
2010
15 years 2 months ago
Receipt-Free K-out-of-L Voting Based on ElGamal Encryption
We present a K-out-of-L voting scheme, i.e., a voting scheme that allows every voter to vote for (up to) K candidates from a set of L candidates. The scheme is receipt-free, which ...
Martin Hirt
ACMSE
2009
ACM
15 years 1 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
CORR
2011
Springer
200views Education» more  CORR 2011»
14 years 11 months ago
Optimal Channel Training in Uplink Network MIMO Systems
We consider a multi-cell frequency-selective fading uplink channel (network MIMO) from K singleantenna user terminals (UTs) to B cooperative base stations (BSs) with M antennas ea...
Jakob Hoydis, Mari Kobayashi, Mérouane Debb...
157
Voted
JSAC
2011
159views more  JSAC 2011»
14 years 11 months ago
An Anti-Jamming Stochastic Game for Cognitive Radio Networks
—Various spectrum management schemes have been proposed in recent years to improve the spectrum utilization in cognitive radio networks. However, few of them have considered the ...
Beibei Wang, Yongle Wu, K. J. Ray Liu, T. Charles ...
178
Voted
IEEEVAST
2010
14 years 10 months ago
Diamonds in the rough: Social media visual analytics for journalistic inquiry
Journalists increasingly turn to social media sources such as Facebook or Twitter to support their coverage of various news events. For large-scale events such as televised debate...
Nicholas Diakopoulos, Mor Naaman, Funda Kivran-Swa...