Sciweavers

189 search results - page 32 / 38
» Leakage-Resilient Zero Knowledge
Sort
View
CCR
2000
101views more  CCR 2000»
14 years 11 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
NCA
2002
IEEE
14 years 11 months ago
The Construction of Smooth Models using Irregular Embeddings Determined by a Gamma Test Analysis
One of the key problems in forming a smooth model from input-output data is the determination of which input variables are relevant in predicting a given output. In this paper we ...
Alban P. M. Tsui, Antonia J. Jones, A. Guedes de O...
TROB
2002
101views more  TROB 2002»
14 years 11 months ago
Two solutions to the adaptive visual servoing problem
In this paper, we present two globally convergent vision-based position controllers for a planar two-links manipulator in the so-called fixed-camera configuration, where the camera...
Alessandro Astolfi, Liu Hsu, Mariana S. Netto, Rom...
INFOCOM
2010
IEEE
14 years 10 months ago
A General Algorithm for Interference Alignment and Cancellation in Wireless Networks
—Physical layer techniques have come a long way and can achieve close to Shannon capacity for single pointto-point transmissions. It is apparent that, to further improve network ...
Erran L. Li, Richard Alimi, Dawei Shen, Harish Vis...
93
Voted
GLOBECOM
2009
IEEE
14 years 9 months ago
SC-FDMA Versus OFDMA: Sensitivity to Large Carrier Frequency and Timing Offsets on the Uplink
In this paper, we present a comparison between the sensitivity of SC-FDMA and OFDMA schemes to large carrier frequency offsets (CFO) and timing offsets (TO) of different users on t...
K. Raghunath, Ananthanarayanan Chockalingam