نتایج جستجو برای: under bounding

تعداد نتایج: 1058225  

Journal: :American Economic Review 2018

Journal: :Proceedings of the American Mathematical Society 2017

Journal: :ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences 2015

Journal: :Physical Review D 2019

2001

• Some bounding techniques are investigated in this section in order to serve as a tool for the analysis that follows. We first state the union upper bound that is widely used in the literature. • Then, some better bounds which are applicable to AWGN channels are also discussed here; they are Gallager bound and sphere upper bound.

2015
Serge Vaudenay

Distance-Bounding is used to defeat relay attacks. For wireless payment systems, the payment terminal is not always online. So, the protocol must rely on a public key for the prover (payer). We propose a generic transformation of a (weakly secure) symmetric distance bounding protocol which has no postverification into wide-strong-private and secure public-key distance bounding.

1999
David W.N. Sharp

We derive a bounding circle for a fractal image specified by an iterated function system. The radius of the bounding circle is smaller than those from previously published material. The bounding circle is important in fractal design and plotting software as it enables a fractal image to be scaled correctly to fit the screen of a digital computer.

Journal: :J. Network and Computer Applications 2011
Gerhard P. Hancke

Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols have been proposed the security of these proposals are dependent on the underlying communication channel. Conventional communication channels have been shown to be inappropriate for implementing distance bounding, as t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید