Sciweavers

1054 search results - page 142 / 211
» Secret Communication with Feedback
Sort
View
JCP
2008
119views more  JCP 2008»
14 years 10 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
SCN
2008
Springer
14 years 9 months ago
Linear Bandwidth Naccache-Stern Encryption
Abstract. The Naccache-Stern (ns) knapsack cryptosystem is an original yet little-known public-key encryption scheme. In this scheme, the ciphertext is obtained by multiplying publ...
Benoît Chevallier-Mames, David Naccache, Jac...
INFOCOM
2010
IEEE
14 years 8 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
CODASPY
2012
13 years 5 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
ICC
2008
IEEE
156views Communications» more  ICC 2008»
15 years 4 months ago
Cross-Layer Design for the MIMO System with Zero-Forcing Receiver in the Presence of Channel Estimation Error
—Multiple input multiple output (MIMO) system has been recognized as a promising candidate for future wireless communication. The adaptive modulation which adjusts the transmitte...
Feng Jiang, Ying Wang, Xi Fang, Kai Sun, Guona Hu,...