Sciweavers

422 search results - page 31 / 85
» Protocol Specialization
Sort
View
ISCAS
2002
IEEE
139views Hardware» more  ISCAS 2002»
15 years 6 months ago
Mobility support for Bluetooth public access
Bluetooth technology offers the potential for low-cost, broadband wireless access for a range of mobile and portable devices. It can thus provide for ubiquitous computing across a...
A. Kansal, Uday B. Desai
TWC
2010
14 years 8 months ago
Multi-hop MIMO relay networks: diversity-multiplexing trade-off analysis
A multi-hop relay network with multiple antenna terminals in a quasi-static slow fading environment is considered. The fundamental diversity-multiplexing gain tradeoff (DMT) is an...
Deniz Gündüz, Mohammad Ali Khojastepour,...
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 8 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis
ASIACRYPT
2001
Springer
15 years 6 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...