Sciweavers

12 search results - page 2 / 3
» csi 2004
Sort
View
CSI
2004
353views more  CSI 2004»
13 years 4 months ago
Design and implementation of a mobile database for Java phones
Due to the popularity of electronic commerce and the maturity of wireless technology, mobile users can access the Internet anytime anywhere without having to physically hook up an...
Eric Jui-Lin Lu, Yung-Yuan Cheng
CSI
2007
54views more  CSI 2007»
13 years 4 months ago
A practical verifiable multi-secret sharing scheme
C.-C. Yang, T.-Y. Chang, M.-S. Hwang [C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483–490] proposed...
Jian-jie Zhao, Jianzhong Zhang 0005, Rong Zhao
CORR
2004
Springer
140views Education» more  CORR 2004»
13 years 4 months ago
Capacity Analysis for Continuous Alphabet Channels with Side Information, Part II: MIMO Channels
In this part, we consider the capacity analysis for wireless mobile systems with multiple antenna architectures. We apply the results of the first part to a commonly known baseban...
Majid Fozunbal, Steven W. McLaughlin, Ronald W. Sc...
CSI
2004
110views more  CSI 2004»
13 years 4 months ago
A novel three-party encrypted key exchange protocol
The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, henc...
Chin-Chen Chang, Ya-Fen Chang
CSI
2004
186views more  CSI 2004»
13 years 4 months ago
Towards a BioAPI compliant face verification system
Standards are important to the growth and acceptance of emerging industries such as the biometric industry. To promote biometric standard, the BioAPI Consortium has developed a wi...
X. Yuan, Siu Cheung Hui, Maylor K. H. Leung, Yongs...