• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,465
Next 10 →

Secure capacity of wireless broadcast networks

by Guanfeng Liang, Rachit Agarwal, Nitin H. Vaidya , 2009
"... We give a constructive characterization for the capacity of wireless broadcast networks that are prone to Byzantine attacks. The adversary controls a single node in the network and can modify the packets flowing through the node. The central trade-off in such a scenario is that of security and throu ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
We give a constructive characterization for the capacity of wireless broadcast networks that are prone to Byzantine attacks. The adversary controls a single node in the network and can modify the packets flowing through the node. The central trade-off in such a scenario is that of security

Security capacity of the fuzzy fingerprint vault

by Johannes Merkle, Matthias Niesing, Michael Schwaiger, Heinrich Ihmor, Ulrike Korte - International Journal on Advances in Security, 3(3 & 4):146–168 , 2010
"... Abstract—We investigate the security of a privacy enhancing technique for fingerprint authentication known as fuzzy fingerprint vault. This technique is based on the fuzzy vault of Jules and Sudan, a scheme that allows error tolerant authentication, while pre-serving the privacy of the reference dat ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
. Furthermore, we show how to select optimal parameters and evaluate both minimum minutiae match rates and minimum number of minutiae needed to obtain an appropri-ate security level. Our results quantify the security capacity of the fuzzy fingerprint vault and provide important tools for selection of suitable

Secure capacity region for erasure broadcast channels with feedback

by László Czap, Vinod M. Prabhakaran, Suhas Diggavi, Christina Fragouli - ArXiv, abs/110.5741, 2011. [Online]. Available: http://http://arxiv.org/abs/1110.5741
"... ar ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract not found

West Africa Food Security Capacity Strengthening and Research Program

by Composante Srai
"... Estimation des prix de parité du riz et du maïs en 2009 au Burkina Par: Eric Pale (SIM-Burkina) Les documents du PRESAO sont disponibles à ..."
Abstract - Add to MetaCart
Estimation des prix de parité du riz et du maïs en 2009 au Burkina Par: Eric Pale (SIM-Burkina) Les documents du PRESAO sont disponibles à

West Africa Food Security Capacity Strengthening and Research Program

by unknown authors
"... Estimation des prix de parité du riz et du maïs en 2009 en Côte d’Ivoire Par: ..."
Abstract - Add to MetaCart
Estimation des prix de parité du riz et du maïs en 2009 en Côte d’Ivoire Par:

Generalized privacy amplification

by Charles H. Bennett, Gilles Brassard, Claude Crkpeau, Ueli M. Maurer, Senior Member - IEEE Transactions on Information Theory , 1995
"... Abstract- This paper provides a general treatment of pri-vacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario. Privacy amplification is a process that allows two parties to distill a secret key from a common random variable about which ..."
Abstract - Cited by 325 (19 self) - Add to MetaCart
results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity. Index Terms- Cryptography, secret-key agreement, uncondi-tional security, privacy amplification, wiretap channel, secrecy capacity, RCnyi entropy, universal hashing, quantum cryptogra-phy. I.

Secure Transmission with Multiple Antennas: The MISOME Wiretap Channel

by Ashish Khisti, Gregory W. Wornell , 2007
"... The role of multiple antennas for secure communication is investigated within the framework of Wyner’s wiretap channel. We characterize the secrecy capacity in terms of generalized eigenvalues when the sender and eavesdropper have multiple antennas, the intended receiver has a single antenna, and t ..."
Abstract - Cited by 240 (19 self) - Add to MetaCart
The role of multiple antennas for secure communication is investigated within the framework of Wyner’s wiretap channel. We characterize the secrecy capacity in terms of generalized eigenvalues when the sender and eavesdropper have multiple antennas, the intended receiver has a single antenna

Gamal, “On the secrecy capacity of fading channels

by Praveen Kumar Gopala, Lifeng Lai, Hesham El Gamal - in Proc. IEEE Int. Symp. Information Theory (ISIT
"... We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner’s wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long c ..."
Abstract - Cited by 203 (9 self) - Add to MetaCart
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner’s wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long

Secure communication over fading channels

by Yingbin Liang, H. Vincent Poor, Shlomo Shamai (Shitz) , 2007
"... The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from rec ..."
Abstract - Cited by 186 (21 self) - Add to MetaCart
with independent subchannels is first studied, which serves as an information-theoretic model for the fading BCC. The secrecy capacity region of the parallel BCC is established. This result is then specialized to give the secrecy capacity region of the parallel BCC with degraded subchannels. The secrecy capacity

Disclosure, liquidity, and the cost of capital

by Douglas W. Diamond, Robert E. Verrecchia - Journal of Finance , 1991
"... This paper shows that revealing public information to reduce information asymme-try can reduce a firm's cost of capital by attracting increased demand from large investors due to increased liquidity of its securities. Large firms will disclose more information since they benefit most. Disclosur ..."
Abstract - Cited by 251 (8 self) - Add to MetaCart
. Disclosure also reduces the risk bearing capacity available through market makers. If initial information asymmetry is large, reducing it will increase the current price of the security. However, the maximum current price occurs with some asymmetry of information: further reduc-tion of information asymmetry
Next 10 →
Results 1 - 10 of 3,465
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University