: For an electronic election to be fully democratic there is a need for security mechanisms that will assure the privacy of the voters. With receipt-free electronic voting, a voter...
Emmanouil Magkos, Mike Burmester, Vassilios Chriss...
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and in...
—Modulation techniques have attracted increasing attention in optical wireless communications. Basic schemes such as on off keying (OOK), pulse amplitude modulation (PAM) and pul...
Yu Zeng, Roger J. Green, Shaobo Sun, Mark S. Leeso...
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy
conditions and communication costs. This is motivated by a
numbe...