Results 1 to 10 of about 4,621,200 (286)
Stealthy Secret Key Generation. [PDF]
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications. When legitimate users have no channel advantage over Willie, the legitimate users may need additional secret keys to confuse Willie, if the stealth or covert communication is ...
Lin PH +3 more
europepmc +8 more sources
ShakeMe: Key Generation From Shared Motion [PDF]
Devices equipped with accelerometer sensors such as today's mobile devices can make use of motion to exchange information. A typical example for shared motion is shaking of two devices which are held together in one hand.
Gabbouj, Moncef +4 more
core +3 more sources
Key Generation Method Based on Multi-Satellite Cooperation and Random Perturbation [PDF]
In low-earth-orbit (LEO) satellite-to-ground communication, the size of satellite antennae is limited and the satellite motion trajectory is predictable, which makes the channel state information (CSI) of the satellite-to-ground channel easy to leak and ...
Yinuo Hao +3 more
doaj +2 more sources
Polar Coding for Secret-Key Generation [PDF]
Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification.
Abbe, Emmanuel +2 more
core +2 more sources
Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks [PDF]
Body-worn sensor networks are important for rescue-workers, medical and many other applications. Sensitive data are often transmitted over such a network, motivating the need for encryption.
Patrick Van Torre
doaj +2 more sources
A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks [PDF]
Secret key leakage in wireless sensor networks (WSNs) is a high security risk especially when sensor nodes are deployed in hostile environment and physically accessible to attackers.
Wenchao Liu +3 more
doaj +2 more sources
This paper proposes a novel branch voltage-balancing control strategy for a hexagonal converter (Hexverter). First, the state-space model based on the double-dq transformation is analyzed in-depth along with the necessary basic mathematical derivation ...
Yang Yi +3 more
doaj +1 more source
It is established by the voltage source converter supraharmonic model based on the principle of RC-SPWM. The relationship among the carrier randomness and amplitude as well as the phase randomness of supraharmonic is explored.
Jiawei YANG +4 more
doaj +1 more source
Insulation condition evaluation of oil-immersed transformer based on entropy weight hierarchy method
In order to evaluate the insulation condition of oil-immersed transformers effectively, a weight allocation method considering expert experience and degradation state is proposed in this paper.
LI Bo +5 more
doaj +1 more source
Based on impedance analysis, this paper focuses on the circulation control of a modular multilevel converter (MMC) and conducts in-depth research on the stability impact of offshore wind farm integration based on a permanent magnetic synchronous ...
Shuting YANG +3 more
doaj +1 more source

