نتایج جستجو برای: tesla protocol

تعداد نتایج: 257266  

Journal: :IEEE Transactions on Aerospace and Electronic Systems 2021

Data and signal authentication schemes are being proposed to address Global Navigation Satellite Systems' (GNSS) vulnerability spoofing. Due the low power of their signals, bandwidth available for in GNSS is scarce. Since delayed-disclosure protocols, e.g., TESLA (timed-efficient stream loss-tolerant authentication), efficient terms robust impairments, they have been implemented by GNSS. The le...

Journal: :Chinese medical journal 2009
Jian Yang Wei Wang Ya-rong Wang Gang Niu Chen-wang Jin Ed Xuekui Wu

BACKGROUND The breathhold contrast-enhanced three-dimensional magnetic resonance angiography (MRA) using T1-weighted gradient-echo imaging sequence is the standard technique for MRA of the thorax. However, this technique is not desirable for certain patients with respiratory insufficiency, serious renal impairment, or allergy to contrast agents. The objective of this study was to optimize and e...

2003
Krzysztof T. Pozniak Ryszard S. Romaniuk

The paper describes a functional idea of the parameterized control layer for the FPGA based advanced electronic and photonic systems. The systems under considerations are used (or planned to be used) for the construction of distributed, control, simulation, measurement and data acquisition in the Low Level Radio Frequency (LLRF) part of the TESLA and X-Ray FEL projects in DESY. Practical realiz...

Journal: :International Journal of Satellite Communications and Networking 2021

VDES R-Mode aims at providing a contingency maritime positioning and navigation system when the operation of Global Navigation Satellite Systems (GNSS) is disrupted. However, R-Mode, similarly to GNSS, can itself also be subject different types attacks, such as jamming or spoofing. In this paper, we evaluate vulnerabilities discuss effectiveness cost countermeasures. The outcome cost-benefit an...

2009
M. Benerecetti N. Cuomo A. Peron

The use of formal methods in software engineering for the specification and the verification is suitable when developing complex systems. The distributed nature, the subtle time dependence and the strict requirements of time sensitive security protocols increase the inherent complexity of their validation. Using the TESLA authentication protocol as a case study, we shall discuss what are the fu...

Journal: :Multiple sclerosis 2008
Ja Cabrera-Gómez A Saiz-Hinarejos F Graus A González-Quevedo R Rodríguez-Rojas L Quevedo-Sotolongo Y Real-González D Grass-Fernández M Cristófol-Corominas Ml Rodríguez-Cordero Ma Robinson-Agramonte E Infante-Velázquez A Cabrera-Núñez C Ugarte-Sánchez J Jordán-González Je González de la Nuez J García-Lahera R Tellez M Baez-Martín K Romero-García

We studied cranial magnetic resonance imaging (MRI) lesions in three women with acute attacks of recurrent longitudinally extensive transverse myelitis (r-LETM), recurrent-optic neuritis (r-ON) and r-LETM-CNS. Neuromyelitis Optica -immunoglobulin (IgG) antibody was positive in all cases. Brain MRI (1.5 Tesla) was performed according to protocol from consortium MS centre. We described the crania...

2010
A. Francillon

This document details the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) packet source authentication and packet integrity verification protocol and its integration within the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) content delivery protocols. This document only considers the authentication/integrity verification of the packets generated by the...

2009
Ali Fanian Mehdi Berenjkoub Aaron Gulliver

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

2012
Jianli Wang Laibo Zheng Li Zhao Dan Tian

LEACH is the first protocol of wireless sensor networks based on clustering and layered structure technology, but the security problem related to the wireless sensor network is not considered. Therefore, it is necessary to provide an efficient security routing algorithm for practical wireless sensor networks. In this paper, we proposed a LEACH-based key management scheme for wireless sensor net...

2016
Jordan M. K. DeKraker

Probing the functions of human hippocampal subfields is a promising area of research in cognitive neuroscience. However, defining subfield borders in Magnetic Resonance Imaging (MRI) is challenging. Here, we present a user-guided, semi-automated protocol for segmenting hippocampal subfields on T2-weighted images obtained with 7-Tesla MRI. The protocol takes advantage of extant knowledge about r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید