نتایج جستجو برای: key pre

تعداد نتایج: 847114  

Journal: :IEEE Trans. Signal Processing 2002
Olivier Grellier Pierre Comon Bernard Mourrain Philippe Trebuchet

In this paper, a novel analytical blind single-input single-output (SISO) identification algorithm is presented, based on the noncircular second-order statistics of the output. It is shown that statistics of order higher than two are not mandatory to restore identifiability. Our approach is valid, for instance, when the channel is excited by phase shift keying (PSK) inputs. It is shown that the...

H. Haj Seyyed Javadi I. Qasemzadeh Kolagar M. Anzani

Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...

Journal: :IACR Cryptology ePrint Archive 2016
Eduard Marin Enrique Argones-Rúa Dave Singelée Bart Preneel

Implantable Medical Devices (IMDs) are used to monitor and control patients with chronic diseases. A growing number of IMDs are equipped with a wireless interface that allows non-invasive monitoring and reprogramming through an external device, also known as device programmer. However, this wireless interface also brings important security and privacy risks that may lead to remote attacks. In t...

Journal: :IACR Cryptology ePrint Archive 2012
Ivan Damgård Marcel Keller Enrique Larraia Valerio Pastro Peter Scholl Nigel P. Smart

SPDZ (pronounced “Speedz”) is the nickname of the MPC protocol of Damgård et al. from Crypto 2012. SPDZ provided various efficiency innovations on both the theoretical and practical sides compared to previous work in the preprocessing model. In this paper we both resolve a number of open problems with SPDZ; and present several theoretical and practical improvements to the protocol. In detail, w...

Journal: :Wireless Networks 2015
Yu Seung Kim Patrick Tague Heejo Lee Hyogon Kim

Prevalent Wi-Fi networks have adopted various protections to prevent eavesdropping caused by the intrinsic shared nature of wireless medium. However, many of them are based on pre-shared secret incurring key management costs, and are still vulnerable from practical countermeasures. In this study, we investigate the feasibility of using defensive jamming technique to protect enterprise Wi-Fi net...

Journal: :Research Journal of Applied Sciences, Engineering and Technology 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید