نتایج جستجو برای: hybrid schemes
تعداد نتایج: 289827 فیلتر نتایج به سال:
Relay-assisted transmission schemes for wireless networks are continuing to grow because of their potential of providing the benefits of space diversity. This paper applies hybrid relaying protocols to coded cooperation which is a combined scheme of user cooperation and channel codes. The hybrid relaying protocol adaptively uses the amplify-and-forward and decode-and-forward whether a relay dec...
The hybrid signcryption scheme based on certificateless public key cryptography avoids the complexity of certificate management existing in the traditional public key cryptography and the inherent key escrow problem existing in identity-based public key cryptography. The certificateless hybrid signcryption scheme combined with certificateless signcryption key encapsulation mechanism and data en...
Over the past decade, the hybrid lattice reduction and meetin-the middle attack (called the Hybrid Attack) has been used to evaluate the security of many lattice-based cryprocraphic schemes such as NTRU, NTRU prime, BLISS, and more. However, unfortunately none of the previous analyses of the Hybrid Attack is entirely satisfactory: they are based on simplifying assumptions that may distort the s...
Wireless sensor networks (WSNs) have recently gained a lot of attention by scientific community. Small and inexpensive devices with low energy consumption and limited computing resources are increasingly being adopted in different application scenarios including environmental monitoring, target tracking and biomedical health monitoring. In many such applications, node localization is inherently...
In this paper, bandwidth ef£cient Type-I and Type-II hybridARQ (HARQ) schemes using turbo trellis coded modulation (TTCM) are proposed. These schemes combine the power ef£ciency of turbo codes with the bandwidth ef£ciency of trellis coded modulation (TCM) to create an effective hybrid FEC/ARQ system. Several packet combining schemes are presented for use in conjunction with iterative turbo deco...
The first-order schemes used for discretisation of the convective terms are straightforward and easy to use, with the drawback of introducing numerical diffusion. Application of the secondorder schemes, such as QUICK scheme, is a treatment to reduce the numerical diffusion, but increasing convergence oscillation is unavoidable. The technique used in this study is a compromise between the above-...
Secure authentication schemes between an authentication server and users are required to avoid many risks on the Internet. There are three authentication schemes: static password authentications like Basic and Digest Access Authentication[1], public-key certificate schemes, and one-time password schemes. In spite of using SSL/TLS, the static password authentications are known as being insecure ...
Hybrid ARQ schemes can yield much better throughput and reliability than static FEC schemes for the transmission of data over timevarying wireless channels. However these schemes result in extra delay. They adapt to the varying channel conditions by retransmitting erroneous packets, this causes variable effective data rates for current PCS networks because the channel bandwidth is constant. Hyb...
In this paper, we consider the Type-II Hybrid ARQ schemes with the LDPC codes having the rate of 0.5 through MIMO-OFDM Spatial Multiplexing (SM) schemes for high speed and high throughput transmission. MMSE nulling and MLD are used for the signal separation and detection method in SM. We also have used the channel estimation per subcarrier with MMSE criterion. The uncoded Hybrid ARQ schemes wit...
Signcryption schemes aim to provide all of the advantages of simultaneously signing and encrypting a message. Recently, Dent [8, 9] and Bjørstad [4] investigated the possibility of constructing provably secure signcryption schemes using hybrid KEM-DEM techniques [7]. We build on this work by showing that more efficient insider secure hybrid signcryption schemes can be built using tag-KEMs [1]. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید