Results 1 to 10 of about 4,621,200 (286)

Stealthy Secret Key Generation. [PDF]

open access: yesEntropy (Basel), 2020
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications. When legitimate users have no channel advantage over Willie, the legitimate users may need additional secret keys to confuse Willie, if the stealth or covert communication is ...
Lin PH   +3 more
europepmc   +8 more sources

ShakeMe: Key Generation From Shared Motion [PDF]

open access: yes2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015
Devices equipped with accelerometer sensors such as today's mobile devices can make use of motion to exchange information. A typical example for shared motion is shaking of two devices which are held together in one hand.
Gabbouj, Moncef   +4 more
core   +3 more sources

Key Generation Method Based on Multi-Satellite Cooperation and Random Perturbation [PDF]

open access: yesEntropy, 2021
In low-earth-orbit (LEO) satellite-to-ground communication, the size of satellite antennae is limited and the satellite motion trajectory is predictable, which makes the channel state information (CSI) of the satellite-to-ground channel easy to leak and ...
Yinuo Hao   +3 more
doaj   +2 more sources

Polar Coding for Secret-Key Generation [PDF]

open access: yesIEEE Transactions on Information Theory, 2015
Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification.
Abbe, Emmanuel   +2 more
core   +2 more sources

Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks [PDF]

open access: yesSensors, 2016
Body-worn sensor networks are important for rescue-workers, medical and many other applications. Sensitive data are often transmitted over such a network, motivating the need for encryption.
Patrick Van Torre
doaj   +2 more sources

A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks [PDF]

open access: yesSensors, 2014
Secret key leakage in wireless sensor networks (WSNs) is a high security risk especially when sensor nodes are deployed in hostile environment and physically accessible to attackers.
Wenchao Liu   +3 more
doaj   +2 more sources

Branch Voltage Balancing Control Strategy Based on the Transfer Power Model by Zero-Sequence Circulating Current for the Hexverter

open access: yesIEEE Access, 2022
This paper proposes a novel branch voltage-balancing control strategy for a hexagonal converter (Hexverter). First, the state-space model based on the double-dq transformation is analyzed in-depth along with the necessary basic mathematical derivation ...
Yang Yi   +3 more
doaj   +1 more source

Principle of Supraharmonic Elimination Based on Random Carrier Sinusoidal Pulse Width Modulation for Converter Clusters

open access: yesZhongguo dianli, 2023
It is established by the voltage source converter supraharmonic model based on the principle of RC-SPWM. The relationship among the carrier randomness and amplitude as well as the phase randomness of supraharmonic is explored.
Jiawei YANG   +4 more
doaj   +1 more source

Insulation condition evaluation of oil-immersed transformer based on entropy weight hierarchy method

open access: yes电力工程技术, 2023
In order to evaluate the insulation condition of oil-immersed transformers effectively, a weight allocation method considering expert experience and degradation state is proposed in this paper.
LI Bo   +5 more
doaj   +1 more source

Impedance Modeling Method of Offshore Wind Farm Integration Through MMC-HVDC With MMC Circulation Control

open access: yesZhongguo dianli, 2023
Based on impedance analysis, this paper focuses on the circulation control of a modular multilevel converter (MMC) and conducts in-depth research on the stability impact of offshore wind farm integration based on a permanent magnetic synchronous ...
Shuting YANG   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy