Sciweavers

76 search results - page 7 / 16
» Practical Constructions to Multiple Designated Confirmer Sig...
Sort
View
CISC
2007
Springer
108views Cryptology» more  CISC 2007»
13 years 11 months ago
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where e...
Christophe Tartary, Josef Pieprzyk, Huaxiong Wang
GLOBECOM
2009
IEEE
14 years 2 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li
MSE
2005
IEEE
148views Hardware» more  MSE 2005»
14 years 1 months ago
Teaching System-Level Design Using SpecC and SystemC
System-level design of embedded computer systems is essential to manage complexity and enhance designer productivity. Viewing designs at t abstraction levels allows developers to ...
Robert D. Walstrom, Joseph Schneider, Diane T. Rov...
CN
2008
138views more  CN 2008»
13 years 7 months ago
Analysis of bandwidth efficiency in overlay multicasting
act 11 Overlay multicasting has been proposed for implementing multicast routing in the application layer as a practical alter12 native to IP multicasting. Since a packet in overla...
Changhan Kim, Younghoon Kim, Jae-Heon Yang, Ikjun ...
VTC
2010
IEEE
174views Communications» more  VTC 2010»
13 years 6 months ago
Multiple-Relay Aided Distributed Turbo Coding Assisted Differential Unitary Space-Time Spreading for Asynchronous Cooperative Ne
—This paper proposes a cooperative space-time coding (STC) protocol, amalgamating the concepts of asynchronous cooperation, non-coherent detection as well as Distributed Turbo Co...
Shinya Sugiura, Soon Xin Ng, Lingkun Kong, Sheng C...