Results 11 to 20 of about 4,573,671 (268)
ShakeMe: Key Generation From Shared Motion [PDF]
Devices equipped with accelerometer sensors such as today's mobile devices can make use of motion to exchange information. A typical example for shared motion is shaking of two devices which are held together in one hand.
Gabbouj, Moncef +4 more
core +3 more sources
Polar Coding for Secret-Key Generation [PDF]
Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification.
Abbe, Emmanuel +2 more
core +2 more sources
Stealthy Secret Key Generation. [PDF]
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications. When legitimate users have no channel advantage over Willie, the legitimate users may need additional secret keys to confuse Willie, if the stealth or covert communication is ...
Lin PH +3 more
europepmc +8 more sources
Practical demand response potential evaluation of air-conditioning loads for aggregated customers
The evaluation of demand response (DR) potential is of vital significance for evaluating the possible power reduction, forming constraints for optimal economic dispatching, and targeting appropriate customers effectively. To improve the applicability and
Ning Qi +4 more
doaj +1 more source
The secondary water droplets in the steam turbine wet steam stage are easy to cause water erosion damage to the rotor cascade, and there is a large speed slip between the main steam flow and the secondary water droplets, which will seriously affect the ...
Xu Han +6 more
doaj +1 more source
Stealthy secret key generation [PDF]
22 pages, 1 figure, submitted to ISIT 2017.
Lin, Pin-Hsun +2 more
openaire +2 more sources
Finite time adaptive synchronous control for fractional‐order chaotic power systems
As a complex non‐linear system, the chaotic oscillation of power system seriously threatens the safe and stable operation of power grids. In this paper, a finite time adaptive synchronization control method is proposed to mitigate the problem of chaotic ...
Chunyu Ai +3 more
doaj +1 more source
A novel compressed air energy storage (CAES) system has been developed, which is innovatively integrated with a coal-fired power plant based on its feedwater heating system.
Peiyuan Pan +5 more
doaj +1 more source
This study proposes a steady-state model of multi-port electric energy router (EER) and a power flow analysis method for AC/DC hybrid system considering control strategies. Firstly, a circuit topology model of EER is put forward, including AC and DC port
Yu Shen +6 more
doaj +1 more source
New Physical Layer Key Generation Dimensions: Subcarrier Indices/Positions-Based Key Generation
In this letter, novel algorithms for secret key generation from the wireless channel in multi-carrier systems are proposed for ensuring the confidentiality and authentication in wireless communication systems. The novelty of the proposed algorithms lies in the generation of random secret bits not just from the magnitudes of orthogonal frequency ...
Haji M. Furqan +2 more
openaire +3 more sources

