Speech recovery quality assessment in secure wireless communication channels
نویسندگان
چکیده
منابع مشابه
A Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering
In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...
متن کاملQuality Assessment of Wideband Speech Communication Services
This article describes a method for estimating the subjective quality of wideband (7-kHz) speech solely from physical characteristics of terminals and networks. It enables efficient quality design and management of wideband speech communication services. The validity of this model was shown through experiments. Quality Assessment of Wideband Speech Communication Services Letters † NTT Service I...
متن کاملSecure Communication Using Authenticated Channels
Our main motivation is to design more user-friendly security protocols. Indeed, if the use of the protocol is tedious, most users will not behave correctly and, consequently, security issues occur. An example is the actual behavior of a user in front of an SSH certificate validation: while this task is of utmost importance, about 99% of SSH users accept the received certificate without checking...
متن کاملSecure Communications over Wireless Channels
In this work, we present new techniques that leverage the wireless medium in facilitating secure communications in the presence of eavesdroppers. First, we consider the secure transmission of information over an ergodic fading channel with long coherence intervals. The secrecy capacity of such a system is characterized under different assumptions on the available channel state information. We t...
متن کاملSecure Refinements of Communication Channels
It is a common practice to design a protocol (say Q) assuming some secure channels. Then the secure channels are implemented using any standard protocol, e.g. TLS. In this paper, we study when such a practice is indeed secure. We provide a characterization of both confidential and authenticated channels. As an application, we study several protocols of the literature including TLS and BAC proto...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ukrainian Scientific Journal of Information Security
سال: 2012
ISSN: 2411-071X,2225-5036
DOI: 10.18372/2225-5036.17.3389