نتایج جستجو برای: tesla protocol
تعداد نتایج: 257266 فیلتر نتایج به سال:
Data and signal authentication schemes are being proposed to address Global Navigation Satellite Systems' (GNSS) vulnerability spoofing. Due the low power of their signals, bandwidth available for in GNSS is scarce. Since delayed-disclosure protocols, e.g., TESLA (timed-efficient stream loss-tolerant authentication), efficient terms robust impairments, they have been implemented by GNSS. The le...
BACKGROUND The breathhold contrast-enhanced three-dimensional magnetic resonance angiography (MRA) using T1-weighted gradient-echo imaging sequence is the standard technique for MRA of the thorax. However, this technique is not desirable for certain patients with respiratory insufficiency, serious renal impairment, or allergy to contrast agents. The objective of this study was to optimize and e...
The paper describes a functional idea of the parameterized control layer for the FPGA based advanced electronic and photonic systems. The systems under considerations are used (or planned to be used) for the construction of distributed, control, simulation, measurement and data acquisition in the Low Level Radio Frequency (LLRF) part of the TESLA and X-Ray FEL projects in DESY. Practical realiz...
VDES R-Mode aims at providing a contingency maritime positioning and navigation system when the operation of Global Navigation Satellite Systems (GNSS) is disrupted. However, R-Mode, similarly to GNSS, can itself also be subject different types attacks, such as jamming or spoofing. In this paper, we evaluate vulnerabilities discuss effectiveness cost countermeasures. The outcome cost-benefit an...
The use of formal methods in software engineering for the specification and the verification is suitable when developing complex systems. The distributed nature, the subtle time dependence and the strict requirements of time sensitive security protocols increase the inherent complexity of their validation. Using the TESLA authentication protocol as a case study, we shall discuss what are the fu...
We studied cranial magnetic resonance imaging (MRI) lesions in three women with acute attacks of recurrent longitudinally extensive transverse myelitis (r-LETM), recurrent-optic neuritis (r-ON) and r-LETM-CNS. Neuromyelitis Optica -immunoglobulin (IgG) antibody was positive in all cases. Brain MRI (1.5 Tesla) was performed according to protocol from consortium MS centre. We described the crania...
This document details the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) packet source authentication and packet integrity verification protocol and its integration within the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) content delivery protocols. This document only considers the authentication/integrity verification of the packets generated by the...
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
LEACH is the first protocol of wireless sensor networks based on clustering and layered structure technology, but the security problem related to the wireless sensor network is not considered. Therefore, it is necessary to provide an efficient security routing algorithm for practical wireless sensor networks. In this paper, we proposed a LEACH-based key management scheme for wireless sensor net...
Probing the functions of human hippocampal subfields is a promising area of research in cognitive neuroscience. However, defining subfield borders in Magnetic Resonance Imaging (MRI) is challenging. Here, we present a user-guided, semi-automated protocol for segmenting hippocampal subfields on T2-weighted images obtained with 7-Tesla MRI. The protocol takes advantage of extant knowledge about r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید