Sciweavers

2059 search results - page 20 / 412
» A Directed Threshold - Signature Scheme
Sort
View
DAC
1999
ACM
15 years 2 months ago
Mixed-Vth (MVT) CMOS Circuit Design Methodology for Low Power Applications
Dual threshold technique has been proposed to reduce leakage power in low voltage and low power circuits by applying a high threshold voltage to some transistors in non-critical p...
Liqiong Wei, Zhanping Chen, Kaushik Roy, Yibin Ye,...
NETWORKING
2000
14 years 11 months ago
Threshold-Based Registration (TBR) in Mobile IPv6
The underlying principles of IETF Internet Draft, Mobility Support in IPv6, make it possible to employ some mechanisms to improve handoff smoothness, to maintain optimized data tra...
Linfeng Yang, Jouni Karvo, Teemu Tynjälä...
SCN
2008
Springer
128views Communications» more  SCN 2008»
14 years 9 months ago
On Linear Secret Sharing for Connectivity in Directed Graphs
In this work we study linear secret sharing schemes for s-t connectivity in directed graphs. In such schemes the parties are edges of a complete directed graph, and a set of partie...
Amos Beimel, Anat Paskin
ICIP
2006
IEEE
15 years 11 months ago
New Results on Efficient Optimal Multilevel Image Thresholding
Image thresholding is one of the most common image processing operations, since almost all image processing schemes need some sort of separation of the pixels into different class...
Martin Luessi, Marco Eichmann, Guido M. Schuster, ...
ACISP
1999
Springer
15 years 2 months ago
Changing Thresholds in the Absence of Secure Channels
The ways the threshold parameter can be modified after the setup of a secret sharing scheme is the main theme of this work. The considerations are limited to the case when there ...
Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-N...