نتایج جستجو برای: key pre
تعداد نتایج: 847114 فیلتر نتایج به سال:
In this work, we initiate the study of position-based cryptography in the quantum setting. The aim is to use the geographical position of a party as its only credential. This has interesting applications, e.g., it enables two military bases to communicate over insecure channels and without having any pre-shared key, with the guarantee that only parties within the bases learn the content of the ...
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document specifies three se...
Categorization Abstract: Trending topic of newspapers is an indicator to understand the situation of a country and also a way to evaluate the particular newspaper. This paper represents a model describing few techniques to select trending topics from Bangla Newspaper. Topics that are discussed more frequently than other in Bangla newspaper will be marked and how a very famous topic loses its ...
This paper discusses noisy index coding problem over Gaussian broadcast channel. We propose a technique for mapping the index coded bits to M-QAM symbols such that the receivers whose side information satisfies certain conditions get coding gain, which we call the QAM side information coding gain. We compare this with the PSK side information coding gain, which was discussed in [1]. Keywords—In...
This paper deals with a new modulation recognition algorithm based on an analysis of time-frequency representations of di erent modulated signals (PSK, QAM and FSK). At rst, we conduct experimental studies over a range of time-frequency representations (TFR) in order to choose the more appropriated one. Once, an appropriated TFR has been chosen, some statistical functions applied on that TFR ar...
This paper introduces a novel blind carrier phase recovery estimator for general 2π/M-rotationally symmetric constellations. This estimation method is a generalization of the non-data-aided (NDA) nonlinear Phase Metric Method (PMM) estimator already designed for general quadrature amplitude constellations. This unbiased estimator is seen here as a fourth order PMM then generalized to M th order...
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, proposed schemes do not provide mechanisms for key revocation and key renewal. In this paper, we propose the first key revocation and key renewal mechanisms for IBC schemes that are especially designed for MANETs. In our f...
The Network Time Protocol (NTP) is used by many network-connected devices to synchronize device time with remote servers. Many security features depend on the device knowing the current time, for example in deciding whether a certificate is still valid. Currently, most services implement NTP without authentication, and the authentication mechanisms available in the standard have not been formal...
It has been shown that with probability one the peak to mean envelope power ratio (PMEPR) of any random codeword chosen from a symmetric QAM/PSK constellation is logn where n is the number of subcarriers [l]. In this paper, the existence of codes with nonzero rate and PMEPR bounded by a constant is established.
A general equation is given for the size of complex constellations constructed from the direct sum of PSK-like constellation primitives. The equation uses a generating function whose numerator is a power of a ’coordination polynomial’. Conjectures are also given as to the form and value of these coordination polynomials for various PSK. The study has relevance to error-coding, polynomial residu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید