Sciweavers

915 search results - page 118 / 183
» Proof labeling schemes
Sort
View
TCC
2009
Springer
151views Cryptology» more  TCC 2009»
14 years 8 months ago
Secret Sharing and Non-Shannon Information Inequalities
The known secret-sharing schemes for most access structures are not efficient; even for a one-bit secret the length of the shares in the schemes is 2O(n) , where n is the number of...
Amos Beimel, Ilan Orlov
GLOBECOM
2009
IEEE
14 years 2 months ago
Dynamic Power Management in Cognitive Radio Networks Based on Constrained Stochastic Games
Abstract—Recent studies have been conducted to indicate the ineffective usage of licensed bands due to the static spectrum allocation. In order to improve the spectrum utilizatio...
Chia-Wei Wang, Yu-Pin Hsu, Kai-Ten Feng
ICC
2009
IEEE
114views Communications» more  ICC 2009»
14 years 2 months ago
Distributed Gradient Based Gain Allocation for Coherent Multiuser AF Relaying Networks
—A set of distributed non-cooperating relay antennas is known to be capable of orthogonalizing multiple sourcedestination pairs in space by coherent amplify-and-forward (AF) rela...
Celal Esli, Jörg Wagner, Armin Wittneben
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
EUROCRYPT
1998
Springer
14 years 11 days ago
Strengthened Security for Blind Signatures
Abstract. Provable security is a very nice property for cryptographic protocols. Unfortunately, in many cases, this is at the cost of a considerable loss in terms of efficiency. Mo...
David Pointcheval