Sciweavers

3483 search results - page 91 / 697
» Forward
Sort
View
124
Voted
IJNSEC
2008
108views more  IJNSEC 2008»
15 years 3 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
117
Voted
CORR
2007
Springer
73views Education» more  CORR 2007»
15 years 3 months ago
A Case For Amplify-Forward Relaying in the Block-Fading Multi-Access Channel
This paper demonstrates the significant gains that multi-access users can achieve from sharing a single amplify-forward relay in slow fading environments. The proposed protocol, ...
Deqiang Chen, Kambiz Azarian, J. Nicholas Laneman
CORR
2007
Springer
57views Education» more  CORR 2007»
15 years 3 months ago
On Evaluating the Rate-Distortion Function of Sources with Feed-Forward and the Capacity of Channels with Feedback
— In this work, we study the problem of evaluating the performance limit of two communication problems that are closely related to each other- source coding with feed-forward and...
Ramji Venkataramanan, S. Sandeep Pradhan