نتایج جستجو برای: hybrid schemes

تعداد نتایج: 289827  

2010
Jaeyoung Lee Sungil Kim Jun Heo

Relay-assisted transmission schemes for wireless networks are continuing to grow because of their potential of providing the benefits of space diversity. This paper applies hybrid relaying protocols to coded cooperation which is a combined scheme of user cooperation and channel codes. The hybrid relaying protocol adaptively uses the amplify-and-forward and decode-and-forward whether a relay dec...

Journal: :I. J. Network Security 2017
Ming Luo Yuwei Wan Donghua Huang

The hybrid signcryption scheme based on certificateless public key cryptography avoids the complexity of certificate management existing in the traditional public key cryptography and the inherent key escrow problem existing in identity-based public key cryptography. The certificateless hybrid signcryption scheme combined with certificateless signcryption key encapsulation mechanism and data en...

Journal: :IACR Cryptology ePrint Archive 2016
Thomas Wunderer

Over the past decade, the hybrid lattice reduction and meetin-the middle attack (called the Hybrid Attack) has been used to evaluate the security of many lattice-based cryprocraphic schemes such as NTRU, NTRU prime, BLISS, and more. However, unfortunately none of the previous analyses of the Hybrid Attack is entirely satisfactory: they are based on simplifying assumptions that may distort the s...

Journal: :CoRR 2013
Asma Mesmoudi Mohammed Feham Nabila Labraoui

Wireless sensor networks (WSNs) have recently gained a lot of attention by scientific community. Small and inexpensive devices with low energy consumption and limited computing resources are increasingly being adopted in different application scenarios including environmental monitoring, target tracking and biomedical health monitoring. In many such applications, node localization is inherently...

2000
Adrish Banerjee Daniel J. Costello Thomas E. Fuja

In this paper, bandwidth ef£cient Type-I and Type-II hybridARQ (HARQ) schemes using turbo trellis coded modulation (TTCM) are proposed. These schemes combine the power ef£ciency of turbo codes with the bandwidth ef£ciency of trellis coded modulation (TCM) to create an effective hybrid FEC/ARQ system. Several packet combining schemes are presented for use in conjunction with iterative turbo deco...

The first-order schemes used for discretisation of the convective terms are straightforward and easy to use, with the drawback of introducing numerical diffusion. Application of the secondorder schemes, such as QUICK scheme, is a treatment to reduce the numerical diffusion, but increasing convergence oscillation is unavoidable. The technique used in this study is a compromise between the above-...

2011
Ryoichi Isawa Masakatu Morii

Secure authentication schemes between an authentication server and users are required to avoid many risks on the Internet. There are three authentication schemes: static password authentications like Basic and Digest Access Authentication[1], public-key certificate schemes, and one-time password schemes. In spite of using SSL/TLS, the static password authentications are known as being insecure ...

Journal: :MONET 1998
Hang Liu Magda El Zarki

Hybrid ARQ schemes can yield much better throughput and reliability than static FEC schemes for the transmission of data over timevarying wireless channels. However these schemes result in extra delay. They adapt to the varying channel conditions by retransmitting erroneous packets, this causes variable effective data rates for current PCS networks because the channel bandwidth is constant. Hyb...

2009
Yusuke TSURUTA Yasunori IWANAMI Eiji OKAMOTO

In this paper, we consider the Type-II Hybrid ARQ schemes with the LDPC codes having the rate of 0.5 through MIMO-OFDM Spatial Multiplexing (SM) schemes for high speed and high throughput transmission. MMSE nulling and MLD are used for the signal separation and detection method in SM. We also have used the channel estimation per subcarrier with MMSE criterion. The uncoded Hybrid ARQ schemes wit...

Journal: :IACR Cryptology ePrint Archive 2005
Tor E. Bjørstad Alexander W. Dent

Signcryption schemes aim to provide all of the advantages of simultaneously signing and encrypting a message. Recently, Dent [8, 9] and Bjørstad [4] investigated the possibility of constructing provably secure signcryption schemes using hybrid KEM-DEM techniques [7]. We build on this work by showing that more efficient insider secure hybrid signcryption schemes can be built using tag-KEMs [1]. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید