Sciweavers

1054 search results - page 17 / 211
» Secret Communication with Feedback
Sort
View
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, can be realized in an informationtheoretic sense if the parties share many independent pai...
Thomas Holenstein, Renato Renner
ISADS
1999
IEEE
15 years 2 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
ENTCS
2007
88views more  ENTCS 2007»
14 years 9 months ago
Keeping Secrets in Resource Aware Components
We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication ...
Tom Chothia, Jun Pang, Muhammad Torabi Dashti
ASSISTIVE
1998
Springer
15 years 2 months ago
Providing Intelligent Language Feedback for Augmentative Communication Users
People with severe speech and motor impairments SSMI can often use augmentative communication devices to help them communicate. While these devices can provide speech synthesis or ...
Christopher A. Pennington, Kathleen F. McCoy
TIT
2010
110views Education» more  TIT 2010»
14 years 4 months ago
Secure communications with insecure feedback: breaking the high-SNR ceiling
A multiple-antenna Gaussian wiretap channel in which the number of antennas at the source is not greater than that at the eavesdropper is considered. Without feedback, the secrecy...
Tùng T. Kim, H. Vincent Poor