نتایج جستجو برای: key pre
تعداد نتایج: 847114 فیلتر نتایج به سال:
A random key pre-distribution scheme based on key updating (RKKU) was proposed, which is effective in wireless sensor networks. Firstly, the base station will randomly distribute some keys, a hash function and some code slices to each node. Furthermore, the RKKU scheme compares with the information of some random key to find the same key, and computes the communication key between two sensor no...
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo defines an Extensible ...
The goal for the fourth generation (4G) of mobile communications system is to seamlessly integrate a wide variety of communication services such as high speed data, video and multimedia traffic as well as voice signals. One of the promising approaches to 4G is adaptive OFDM (AOFDM). In AOFDM, adaptive transmission scheme is employed according to channel fading condition with OFDM to improve the...
When sensor networks deployed in unattended and hostile environments, for securing communication between sensors, secret keys must be established between them. Many key establishment schemes have been proposed for large scale sensor networks. In these schemes, each sensor shares a secret key with its neighbors via preinstalled keys. But it may occur that two end nodes which do not share a key w...
We present an attack on plain ElGamal and plain RSA encryption. The attack shows that without proper preprocessing of the plaintexts, both ElGamal and RSA encryption are fundamentally insecure. Namely, when one uses these systems to encrypt a (short) secret key of a symmetric cipher it is often possible to recover the secret key from the ciphertext. Our results demonstrate that preprocessing me...
Incoherent detection based on differential encoding has been successfully applied to phase-shift-keying (PSK) signals because it eliminates the need for carrier phase acquisition and tracking at the receiver. This paper generalizes the idea of differential encoding by using a nonlinear transformation called multilag high-order instantaneous moment (ml-HIM). The ml-HIM decoder is capable of remo...
A practical communication channel often suffers from constraints on input other than the average power, such as the peak power constraint. In order to compare achievable rates with different constellations as well as the channel capacity under such constraints, it is crucial to take these constraints into consideration properly. In this paper, we propose a direct approach to compare the achieva...
A new data-aided frequency estimator is introduced for phase-shift keying signals transmitted over frequency-selective fading channels. This estimator is developed based on a maximum likelihood criterion. It assumes the use of a special class of pilots, called near-i.i.d. (independent identically distributed) sequences, with impulsive fourth-order moments. By the help of such pilots, the propos...
The problem of calculating the average bit-error probability (BEP) of coherent -ary phase-shift keying (PSK) over a Gaussian channel has been studied previously in the literature. A solution to the problem for systems using a binary reflected Gray code (BRGC) to map bits to symbols was first presented by Lee. In this letter, we show that the results obtained by Lee are incorrect for 16. We show...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید