نتایج جستجو برای: distance relay

تعداد نتایج: 254950  

2005
Gerhard Hancke

Contactless smart cards are used in access control and payment systems. This paper illustrates an attack which effectively allows an attacker to ‘borrow’ the victim’s card for a short period without requiring physical access to the victim’s card. As a result the legitimate owner will remain unaware of the attack. We show that our hardware successfully executed a relay attack against an ISO 1444...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2009
Roman V Agafonov Igor V Negrashov Yaroslav V Tkachev Sarah E Blakely Margaret A Titus David D Thomas Yuri E Nesmelov

We have used two complementary time-resolved spectroscopic techniques, dipolar electron-electron resonance and fluorescence resonance energy transfer to determine conformational changes in a single structural element of the myosin motor domain, the relay helix, before and after the recovery stroke. Two double-Cys mutants were labeled with optical probes or spin labels, and interprobe distances ...

2015
Demetrios Tziouvaras

Short-circuit calculations are extremely important in the application and setting of protective relays and the analysis of power system operations. This paper illustrates the calculation of fault currents and voltages during intermediate faults in underground cables, taking into consideration the cable sheath bonding and grounding method. The compensated ground loop impedance for faults along t...

2009
Dang Nguyen Duc Jangseong Kim Kwangjo Kim

In this paper, we propose a grouping-proof protocol for RFID tags based on (n, n)-secret sharing. Our proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. We also present a security model for a secure grouping-proof protocol which properly addresses the so called mafia fraud attack (som...

Journal: :international journal of communications and information technology 2011
a. r. sharifi pur shirazi m. kazemian m. jabbari

in this paper first we try to analysis the behavior ofthe soas in the optical networks and then have proposed anumerical simple model to simulate the behavior of thesemiconductor optical amplifiers. after that by employing thismodel as inline amplifier for a dwdm optical system, we havesimulated the transmission of 10 channels with bit rate 10 gb/sup to distance 3970 km with rz-dpsk modulation ...

In this channel,we study rate region of a Gaussian two-way diamond channel which operates in half-duplex mode. In this channel, two transceiver (TR) nodes exchange their messages with the help of two relay nodes. We consider a special case of the Gaussian two-way diamond channels which is called Compute-and-Forward Multiple Access Channel (CF-MAC). In the CF-MAC, the TR nodes transmit their mes...

2003
DANIEL COLLINS NICOLAS GISIN

Quantum cryptography is on the verge of commercial application. One of its greatest limitations is over long distance—secret key rates are low and the longest fibre over which any key has been exchanged is currently 100 km. We investigate the quantum relay, which can increase the maximum distance at which quantum cryptography is possible. The relay splits the channel into sections and sends a d...

2008
Chong Hee Kim Gildas Avoine François Koeune François-Xavier Standaert Olivier Pereira

Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forwarding the signal between the verifier and an out-of-field prover. Distance bounding protocols represent a promising way to thwart relay attacks, by measuring the round trip time of short aut...

2011
Svetlana Girs

In wireless industrial networks consisting of distributed sensors and actuators, the problem of providing reliable and timely communication is still one of the key challenges. Previous research has proved that relaying or socalled cooperative communications can be fruitfully deployed in wireless industrial networks. The goal of the present work is to investigate how different types of channels ...

2012
S. SAID

In a network with dynamic spectrum access, secondary users equipped with frequency-agile cognitive radios communicate with one another via spectrum that is not being used by the primary users or licensed users of the spectrum . We consider a scenario in which a secondary transmitter can communicate with a secondary receiver via a direct communication link or a relay channel. Cooperative relay c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید