Sciweavers

1054 search results - page 26 / 211
» Secret Communication with Feedback
Sort
View
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
15 years 4 months ago
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication...
Mario Strasser, Christina Pöpper, Srdjan Capk...
ICICS
2004
Springer
15 years 3 months ago
A New Key-Insulated Signature Scheme
In this paper we propose a new strong and perfectly key-insulated signature scheme, more efficient than previous proposals and whose key length is constant and independent of the n...
Nicolás González-Deleito, Olivier Ma...
PIMRC
2010
IEEE
14 years 7 months ago
A multi-threshold scheme for feedback load reduction in multiuser MIMO broadcast channel
In a multiuser system, independent time-varying channels among different users can be exploited to provide multiuser diversity (MUD) gain and increase the system throughput. For th...
Jin-Hao Li, Hsuan-Jung Su, Yu-Lun Tsai
VTC
2007
IEEE
15 years 4 months ago
Opportunistic Feedback Protocol for Achieving Sum-Capacity of the MIMO Broadcast Channel
—This paper presents an opportunistic feedback (OF) protocol that achieves the asymptotic sum-capacity of the fading broadcast channel (BC) with a limited amount of feedback. The...
Rajiv Agarwal, Chan-Soo Hwang, John M. Cioffi
TWC
2010
14 years 4 months ago
Closed-Loop Transmit Diversity with Imperfect Feedback
The closed-loop transmit diversity technique is used to improve the performance of the downlink channel in MIMO communication systems. In these closed-loop systems, feedback delay...
A. Heidari, Amir K. Khandani