Sciweavers

393 search results - page 42 / 79
» Interference Channels with Common Information
Sort
View
TIFS
2008
145views more  TIFS 2008»
13 years 7 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
ICIP
2004
IEEE
14 years 9 months ago
Audio-visual flow -a variational approach to multi-modal flow estimation
Just as a motion field is associated to a moving object, an audio field can be associated to an object that can behave as a sound source. The flow field of such a sound source whi...
Raffay Hamid, Aaron F. Bobick, Anthony J. Yezzi
CISS
2010
IEEE
12 years 11 months ago
On Gaussian MIMO compound wiretap channels
— We study the two-user one-eavesdropper discrete memoryless compound wiretap channel, where the transmitter sends a common confidential message to both users, which needs to be...
Ersen Ekrem, Sennur Ulukus
ACSAC
2006
IEEE
14 years 1 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
NTMS
2009
IEEE
14 years 2 months ago
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements
—New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principl...
Sana Tmar Ben Hamida, Jean-Benoît Pierrot, C...