• 沒有找到結果。

[PDF] Top 20 Anonymous channel and authentication in wireless communications

Has 10000 "Anonymous channel and authentication in wireless communications" found on our website. Below are the top 20 most common "Anonymous channel and authentication in wireless communications".

Anonymous channel and authentication in wireless communications

Anonymous channel and authentication in wireless communications

... Abstract In this paper, we propose a scheme for providing anonymous channel service in wireless ...elections, anonymous group discussions, with user identification confidential ... See full document

10

New anonymous channel protocol in wireless communications

New anonymous channel protocol in wireless communications

... invested in the privacy and authentication of wireless communications [1, 2, 7– ...14]. In 1999, Juang et al. proposed an anonymous channel protocol where the ... See full document

5

Anonymous Authentication Scheme for Wireless Communications

Anonymous Authentication Scheme for Wireless Communications

... 摘要: Since, wireless networks make mobile users free from tethers that bind them to fixed places, research topics referred to mobile communications recently become popular.. The exposur[r] ... See full document

1

A Wireless-based Authentication and Anonymous Channels for GSM System

A Wireless-based Authentication and Anonymous Channels for GSM System

... :Authentication, Anonymous Channel, GSM : 1 Introduction Wireless communication systems such as GSM [6] and CDPD [8] systems have become more and more ...popular. Wireless ... See full document

6

Mutually Identity Authentications in GSM-based Anonymous Communications

Mutually Identity Authentications in GSM-based Anonymous Communications

... research in mutual authentications [19] and anonymous communications in the GSM system is to solve the subscriber’s problem of unwillingly leaking his/her identity in a ... See full document

14

Enhanced privacy and authentication for the global system for mobile communications

Enhanced privacy and authentication for the global system for mobile communications

... transmission in GSM. again and sends it to MS2 over the radio ...again. In the data communication security framework, complete security relies on an implementation of a standard method over the ... See full document

13

A practical authentication protocol with anonymity for wireless access networks

A practical authentication protocol with anonymity for wireless access networks

... keys in each session. Recently, Yang et al. [10] proposed a secure and efficient protocol for anonymous channel in wireless sys- tems without employing asymmetric ...copy. ... See full document

10

Quasi-static channel assignment algorithms for wireless communications networks

Quasi-static channel assignment algorithms for wireless communications networks

... cells and the channel requirement constraints for individual cells (to have the call blocking probability of each cell no greater than a given performance ...problem and to facilitate the development ... See full document

4

TOPICS IN WIRELESS COMMUNICATIONS

TOPICS IN WIRELESS COMMUNICATIONS

... advancements in MIMO tech- nologies in IEEE 802.16m and LTE-Advanced that play an essential role in meeting the IMT-Advanced ...links and with various amounts of available ... See full document

2

The effect of channel estimator memory mismatch on the performance of MLSE in wireless data communications

The effect of channel estimator memory mismatch on the performance of MLSE in wireless data communications

... equivalent channel has memory ν = 10, with each tap being independent zero-mean circularly symmetric complex Gaussian distributed, with variances that decay exponentially as shown in ...LS channel ... See full document

5

Joint synchronization, channel length estimation, and channel estimation for the maximum likelihood sequence estimator for high speed wireless communications

Joint synchronization, channel length estimation, and channel estimation for the maximum likelihood sequence estimator for high speed wireless communications

... equivalent channel is first ...the channel estimate. Conventional channel estimation algorithms preset a fixed length for the ...For wireless communications, however, the actual length ... See full document

5

Channel interpolation and MMSE multi-input multi-output frequency-domain DFE for wireless data communications using OFDM

Channel interpolation and MMSE multi-input multi-output frequency-domain DFE for wireless data communications using OFDM

... =0 and conventional receiver with N g =16 and 32 for ...3 and N b = 1 is actually lower for ν = 31 than for ν = ...a channel with memory ν = 31 provides more path diversity (or implicit ... See full document

5

Handoff Ordering Using Signal Strength for Multimedia Communications in Wireless Networks

Handoff Ordering Using Signal Strength for Multimedia Communications in Wireless Networks

... RSS and p while waiting in the ...bandwidth in the handoff queue are sorted continuously according to their ...working in one cell. As the figure shows, if there has no free channel ... See full document

20

interference is one essential feature in wireless communications. The time-

interference is one essential feature in wireless communications. The time-

... scheduler in this work. In order to obtain performance data for the proposed APT power level control algorithms, we carry out several computer simulations in a linear wireless network ... See full document

6

NEW R&D TOOLS FOR WIRELESS COMMUNICATIONS

NEW R&D TOOLS FOR WIRELESS COMMUNICATIONS

... Huang, and Zhou, is a tutorial on compressed sensing and its application to channel ...applications in imaging, data compression, radar, and data ... See full document

1

On Synchronized Channel Sensing and Accessing for Cognitive Radio Users in IEEE 802.11 Wireless Networks

On Synchronized Channel Sensing and Accessing for Cognitive Radio Users in IEEE 802.11 Wireless Networks

... & Communications Research Laboratories, Industrial Technology Research Institute, Hsinchu, Taiwan Email: ...issues in cognitive radio systems is channel sensing and channel ... See full document

5

A Fair Scheme for Multi-channel Selection in Vehicular Wireless Networks

A Fair Scheme for Multi-channel Selection in Vehicular Wireless Networks

... Abstract In recent years, the IEEE 802.11p/1609 wireless access in vehicular environments standards adopt the dedicated short-range communications multi-channel architecture for ... See full document

17

Tracing Anonymous Mobile Attackers in Wireless Network

Tracing Anonymous Mobile Attackers in Wireless Network

... Abstract In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target’s computing ...attacks in a network environment, IP traceback methods are deployed to ... See full document

13

A novel application of the phone card and its authentication in mobile communications

A novel application of the phone card and its authentication in mobile communications

... value, and the impact of loss can also be ...travelers, and it is not conve- nient for them to carry their SIMs and handsets with them all the ...SIMs and handsets could purchase phone cards ... See full document

14

A Deniable Authentication Protocol with Anonymous Sender Protection

A Deniable Authentication Protocol with Anonymous Sender Protection

... However, the sender has no evidence to prove that he/she is the real sender to prevent receivers' implication. Let us consider the situation that a company wants to buy some product with the lowest price. The company ... See full document

8

Show all 10000 documents...