Conference paper
Modeling UpLink power control with outage probabilities
Kenneth L. Clarkson, K. Georg Hampel, et al.
VTC Spring 2007
New protocols for RSA, Rabin, and DSS VΣS are presented. The protocols are efficient and probably secure and can tolerate the malicious behavior of up to half of the proxies. The RSA VΣS scheme is based on a completely novel approach. The recipient of the signature will simply encrypt using a threshold cryptosystems, a public key whose matching secret key is kept shared at the proxies.
Kenneth L. Clarkson, K. Georg Hampel, et al.
VTC Spring 2007
Heinz Koeppl, Marc Hafner, et al.
BMC Bioinformatics
Sankar Basu
Journal of the Franklin Institute
Ligang Lu, Jack L. Kouloheris
IS&T/SPIE Electronic Imaging 2002