نتایج جستجو برای: distance relay
تعداد نتایج: 254950 فیلتر نتایج به سال:
Contactless smart cards are used in access control and payment systems. This paper illustrates an attack which effectively allows an attacker to ‘borrow’ the victim’s card for a short period without requiring physical access to the victim’s card. As a result the legitimate owner will remain unaware of the attack. We show that our hardware successfully executed a relay attack against an ISO 1444...
We have used two complementary time-resolved spectroscopic techniques, dipolar electron-electron resonance and fluorescence resonance energy transfer to determine conformational changes in a single structural element of the myosin motor domain, the relay helix, before and after the recovery stroke. Two double-Cys mutants were labeled with optical probes or spin labels, and interprobe distances ...
Short-circuit calculations are extremely important in the application and setting of protective relays and the analysis of power system operations. This paper illustrates the calculation of fault currents and voltages during intermediate faults in underground cables, taking into consideration the cable sheath bonding and grounding method. The compensated ground loop impedance for faults along t...
In this paper, we propose a grouping-proof protocol for RFID tags based on (n, n)-secret sharing. Our proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. We also present a security model for a secure grouping-proof protocol which properly addresses the so called mafia fraud attack (som...
in this paper first we try to analysis the behavior ofthe soas in the optical networks and then have proposed anumerical simple model to simulate the behavior of thesemiconductor optical amplifiers. after that by employing thismodel as inline amplifier for a dwdm optical system, we havesimulated the transmission of 10 channels with bit rate 10 gb/sup to distance 3970 km with rz-dpsk modulation ...
In this channel,we study rate region of a Gaussian two-way diamond channel which operates in half-duplex mode. In this channel, two transceiver (TR) nodes exchange their messages with the help of two relay nodes. We consider a special case of the Gaussian two-way diamond channels which is called Compute-and-Forward Multiple Access Channel (CF-MAC). In the CF-MAC, the TR nodes transmit their mes...
Quantum cryptography is on the verge of commercial application. One of its greatest limitations is over long distance—secret key rates are low and the longest fibre over which any key has been exchanged is currently 100 km. We investigate the quantum relay, which can increase the maximum distance at which quantum cryptography is possible. The relay splits the channel into sections and sends a d...
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forwarding the signal between the verifier and an out-of-field prover. Distance bounding protocols represent a promising way to thwart relay attacks, by measuring the round trip time of short aut...
In wireless industrial networks consisting of distributed sensors and actuators, the problem of providing reliable and timely communication is still one of the key challenges. Previous research has proved that relaying or socalled cooperative communications can be fruitfully deployed in wireless industrial networks. The goal of the present work is to investigate how different types of channels ...
In a network with dynamic spectrum access, secondary users equipped with frequency-agile cognitive radios communicate with one another via spectrum that is not being used by the primary users or licensed users of the spectrum . We consider a scenario in which a secondary transmitter can communicate with a secondary receiver via a direct communication link or a relay channel. Cooperative relay c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید