Sciweavers

1060 search results - page 68 / 212
» Notes on Coding Theory
Sort
View
ACSAC
2001
IEEE
15 years 1 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
EUROCRYPT
2000
Springer
15 years 1 months ago
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R)
In a series of papers Patarin proposes new efficient public key systems. A very interesting proposal, called 2-Round Public Key System with S Boxes, or 2R, is based on the difficul...
Eli Biham
MSS
2010
IEEE
82views Hardware» more  MSS 2010»
14 years 4 months ago
On the Golden Rule of capital accumulation under endogenous longevity
This note derives the Golden Rule of capital accumulation in a Chakrabortytype economy, i.e. a two-period OLG economy where longevity is endogenous. It is shown that the capital p...
David de la Croix, Gregory Ponthiere
ETT
2006
88views Education» more  ETT 2006»
14 years 9 months ago
On the outage behaviour of large DS-CDMA systems with LMMSE detection
Abstract-- The outage behaviour of the single cell DSCDMA uplink is investigated for flat Rayleigh fading channels. Goal of the work is to find an analytical way for the optimisati...
Oliver Prätor, Gerhard Fettweis
CORR
2007
Springer
119views Education» more  CORR 2007»
14 years 9 months ago
A New Achievability Scheme for the Relay Channel
In this paper, we propose a new coding scheme for the general relay channel. This coding scheme is in the form of a block Markov code. The transmitter uses a superposition Markov ...
Wei Kang, Sennur Ulukus