In this paper, we consider the subliminal channel, hidden in an identification scheme, for signature transfer. We point out that the direct parallelization of the Fiat-Shamir identification scheme has a subliminal cha...
详细信息
This paper presents a 4-move perfect ZKIP of knowledge with no cryptographic assumption for the random self reducible problems [TW87] whose domain is NP∩BPP. The certified discrete log problem is such an example. (Fi...
详细信息
In this paper, we focus on the problem of sensor array calibration in the presence of noise field uncertainties. The objective is to compute a reliable estimate of the array response vector given finite sample estimat...
详细信息
In this paper we discuss some moment properties of a symmetric generalized logistic distribution indexed by a shape parameter X and denoted by GL(X X), and show that it is asymptotically normal as X -*• oo, and asympt...
详细信息
A comparative modeling approach is proposed for a decision support framework enabling users to have access to different modeling techniques within a single system (depending on the problem and the resources available)...
This paper extends the results of Bernstein and Chiu [2], Bernstein and Goodman [3], and Ullman [12], by constructing a parallel algorithm for a subset of tree queries, called chain queries. An efficient parallel algo...
详细信息
The authors use the classical Schur reduction procedure to give a lattice filter implementation of the Chandrasekhar recursions. The derivation is based on the observation that the covariance matrix of a process with ...
详细信息
This paper presents a behavioral characterization of non-hierarchical alternate routing schemes in which a certain number of trunks are reserved for direct routed traffic. It is found that the fundamental behavioral c...
详细信息
暂无评论