نتایج جستجو برای: zero padding
تعداد نتایج: 150601 فیلتر نتایج به سال:
This paper presents a novel technique for separating convolutive mixtures of statistically independent non-Gaussian signals without resorting to an a priori knowledge of the sources or the mixing system. This problem is solved in the frequency domain by transforming the convolutive mixture into several instantaneous mixtures which are independently separated using blind source separation (BSS) ...
Recently, zero-padding orthogonal frequency division multiplexing (ZP-OFDM) has been proposed as an alternative solution to the traditional cyclic prefix (CP)-OFDM, to ensure symbol recovery regardless of channels nulls. Various ZP-OFDM receivers have been proposed in the literature, trading off performance with complexity. In this paper, we propose a novel low-complexity (LC) receiver for ZP-O...
The main impairment of an orthogonal frequency division multiplexing (OFDM) systems is an intercarrier interference (ICI) effect caused by a frequency offset. A zero-padded technique designed for a conjugate cancellation scheme in MIMO-OFDM systems for ICI cancellation is proposed by padding zero between two consecutive symbols over a space-frequency domain. At the receiver, the ICI cancellatio...
While web-based applications are becoming increasingly ubiquitous, they also present new security and privacy challenges. In particular, recent research revealed that many high profile Web applications might cause private user information to leak from encrypted traffic due to side-channel attacks exploiting packet sizes and timing. Moreover, existing solutions, such as random padding and packet...
We consider the impact of the possibility of decryption failures in proofs of security for padding schemes, where these failures are both message and key dependent. We explain that an average case failure analysis is not necessarily sufficient to achieve provable security with existing CCA2-secure schemes. On a positive note, we introduce NAEP, an efficient padding scheme similar to PSS-E desig...
AbsfrucfThis paper makes three contributions. First, we propose Shannon’s perfect secrecy theory as a foundation for developing countermeasures to traffic analysis attacks on information security systems. A system violating the perfect secrecy conditions can leak mission critical information. Second, we suggest statistical pattern recognition as a fundamental technology to test an information s...
In this paper, we examine different methods using techniques of blocking, buffering, and padding for efficient implementations of bit-reversals. We evaluate the merits and limits of each technique and its application and architecture-dependent conditions for developing cache-optimal methods. Besides testing the methods on different uniprocessors, we conducted both simulation and measurements on...
Intel Software Guard Extensions (SGX) aims to provide an isolated execution environment, known as an enclave, for a user-level process to maximize its confidentiality and integrity. In this paper, we study how uninitialized data inside a secure enclave can be leaked via structure padding. We found that, during ECALL and OCALL, proxy functions that are automatically generated by the Intel SGX So...
NIOSH researchers conducted a study to compare seat designs on underground coal mine haulage vehicles. The objective of the study was to support prior findings that NIOSH-designed seats, which incorporated ergonomic design features (e.g., viscoelastic foam padding and low-back support), are improved designs. Based on measured levels of vehicle jarring/jolting and perceived discomfort, researche...
Abstract Edge computing has developed rapidly in recent years due to its advantages of low bandwidth overhead and delay, but it also brings challenges data security privacy. Website fingerprinting (WF) is a passive traffic analysis attack that threatens website privacy which poses great threat user’s web security. It collects network packets generated while user accesses website, then uses seri...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید