Sciweavers

525 search results - page 11 / 105
» Threshold Schemes with Disenrollment
Sort
View
CISS
2007
IEEE
14 years 4 months ago
Analog Coding for Delay-Limited Applications
— In this paper, we consider the problem of sending an analog source over an additive white Gaussian noise channel. The traditional analog coding schemes suffer from the threshol...
Mahmoud Taherzadeh, Amir K. Khandani
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
14 years 3 months ago
Characterizing Ideal Weighted Threshold Secret Sharing
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In such settings, there is a set of users where each user is assigned a positive w...
Amos Beimel, Tamir Tassa, Enav Weinreb
DAC
1999
ACM
14 years 2 months ago
Mixed-Vth (MVT) CMOS Circuit Design Methodology for Low Power Applications
Dual threshold technique has been proposed to reduce leakage power in low voltage and low power circuits by applying a high threshold voltage to some transistors in non-critical p...
Liqiong Wei, Zhanping Chen, Kaushik Roy, Yibin Ye,...
ICIP
2006
IEEE
14 years 11 months ago
New Results on Efficient Optimal Multilevel Image Thresholding
Image thresholding is one of the most common image processing operations, since almost all image processing schemes need some sort of separation of the pixels into different class...
Martin Luessi, Marco Eichmann, Guido M. Schuster, ...
ACISP
1999
Springer
14 years 2 months ago
Changing Thresholds in the Absence of Secure Channels
The ways the threshold parameter can be modified after the setup of a secret sharing scheme is the main theme of this work. The considerations are limited to the case when there ...
Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-N...