Sciweavers

3091 search results - page 66 / 619
» The Color Between Two Others
Sort
View
ICC
2009
IEEE
144views Communications» more  ICC 2009»
15 years 10 months ago
Power Allocation for Multi-Access Two-Way Relaying
—We consider a multi-access two-way relay network where multiple pairs of users exchange information with their pre-assigned partners with the assistance of an intermediate relay...
Min Chen, Aylin Yener
ASIACRYPT
2005
Springer
15 years 8 months ago
Revealing Additional Information in Two-Party Computations
Abstract. A two-argument function is computed privately by two parties if after the computation, no party should know anything about the other inputs except for what he is able to ...
Andreas Jakoby, Maciej Liskiewicz
MDAI
2005
Springer
15 years 8 months ago
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receive...
Takeshi Okamoto, Raylin Tso, Eiji Okamoto
FOSSACS
1998
Springer
15 years 7 months ago
Functor Categories and Two-Level Languages
Abstract. We propose a denotational semantics for the two-level language of [GJ91, Gom92], and prove its correctness w.r.t. a standard denotational semantics. Other researchers (se...
Eugenio Moggi
SIGCOMM
1995
ACM
15 years 6 months ago
Two Issues in Reservation Establishment
This paper addresses two issues related to resource reservation establishment in packet switched networks o ering realtime services. The rst issue arises out of the natural tensi...
Scott Shenker, Lee Breslau