A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy
conditions and communication costs. This is motivated by a
numbe...
The discriminating ability (selectivity) of the chemoreceptor neuron is compared with that of its receptor proteins. The process of neuronal triggering is expected to be cooperativ...
We define two negotiation protocols for Group Decision Making, which main feature is the existence of acceptation thresholds. In order to predict which consensus are expected to ...