Sciweavers

146 search results - page 21 / 30
» Private Quantum Channels
Sort
View
ISPEC
2011
Springer
12 years 11 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang
GLVLSI
2010
IEEE
183views VLSI» more  GLVLSI 2010»
13 years 10 months ago
Semi-analytical model for schottky-barrier carbon nanotube and graphene nanoribbon transistors
This paper describes a physics-based semi-analytical model for Schottky-barrier carbon nanotube (CNT) and graphene nanoribbon (GNR) transistors. The model includes the treatment o...
Xuebei Yang, Gianluca Fiori, Giuseppe Iannaccone, ...
CSFW
2007
IEEE
14 years 2 months ago
Probability of Error in Information-Hiding Protocols
Randomized protocols for hiding private information can often be regarded as noisy channels in the informationtheoretic sense, and the inference of the concealed information can b...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
TCC
2005
Springer
103views Cryptology» more  TCC 2005»
14 years 1 months ago
Fair-Zero Knowledge
Abstract. We introduce Fair Zero-Knowledge, a multi-verifier ZK system where every proof is guaranteed to be “zero-knowledge for all verifiers.” That is, if an honest verifi...
Matt Lepinski, Silvio Micali, Abhi Shelat
ANSS
2002
IEEE
14 years 28 days ago
Performance Analysis for Data Service in Third Generation Mobile Telecommunication Networks
The data traffic in wireless networks for the third generation (3G) mobile telecommunication systems should take into account a variety of services (voice, data, video) and envir...
Aloizio Pereira da Silva, Geraldo Robson Mateus