Sciweavers

319 search results - page 32 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
87
Voted
GLOBECOM
2010
IEEE
14 years 7 months ago
Energy Detection of Wideband and Ultra-Wideband PPM
In this paper, energy detectors are developed for wideband and ultra-wideband (UWB) pulse position modulation (PPM). Exact bit error probability (BEP) formulas are derived under di...
Shahzad Gishkori, Geert Leus, Hakan Deliç
CRYPTO
2009
Springer
122views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Utility Dependence in Correct and Fair Rational Secret Sharing
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that h...
Gilad Asharov, Yehuda Lindell
TARK
2007
Springer
15 years 3 months ago
Knowledge-based modelling of voting protocols
We contend that reasoning about knowledge is both natural and pragmatic for verification of electronic voting protocols. We present a model in which desirable properties of elect...
A. Baskar, Ramaswamy Ramanujam, S. P. Suresh
GLOBECOM
2009
IEEE
14 years 7 months ago
Impact of Asymmetric Routing on Statistical Traffic Classification
Statistical traffic classification techniques are often developed under the assumption that monitoring devices can observe the two half-flows composing each traffic session. Howeve...
Manuel Crotti, Francesco Gringoli, Luca Salgarelli
ICIP
2003
IEEE
15 years 11 months ago
Optimal Gabor kernel location selection for face recognition
In local feature?based face recognition systems, the topographical locations of feature extractors directly affect the discriminative power of a recognizer. Better recognition acc...
Berk Gökberk, Ethem Alpaydin, Lale Akarun, M....