Results 11 to 20 of about 4,573,671 (268)

ShakeMe: Key Generation From Shared Motion [PDF]

open access: yes2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015
Devices equipped with accelerometer sensors such as today's mobile devices can make use of motion to exchange information. A typical example for shared motion is shaking of two devices which are held together in one hand.
Gabbouj, Moncef   +4 more
core   +3 more sources

Polar Coding for Secret-Key Generation [PDF]

open access: yesIEEE Transactions on Information Theory, 2015
Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification.
Abbe, Emmanuel   +2 more
core   +2 more sources

Stealthy Secret Key Generation. [PDF]

open access: yesEntropy (Basel), 2020
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications. When legitimate users have no channel advantage over Willie, the legitimate users may need additional secret keys to confuse Willie, if the stealth or covert communication is ...
Lin PH   +3 more
europepmc   +8 more sources

Practical demand response potential evaluation of air-conditioning loads for aggregated customers

open access: yesEnergy Reports, 2020
The evaluation of demand response (DR) potential is of vital significance for evaluating the possible power reduction, forming constraints for optimal economic dispatching, and targeting appropriate customers effectively. To improve the applicability and
Ning Qi   +4 more
doaj   +1 more source

Research on dehumidification optimization of steam turbine wet steam stage hollow stator cascade heating

open access: yesCase Studies in Thermal Engineering, 2023
The secondary water droplets in the steam turbine wet steam stage are easy to cause water erosion damage to the rotor cascade, and there is a large speed slip between the main steam flow and the secondary water droplets, which will seriously affect the ...
Xu Han   +6 more
doaj   +1 more source

Stealthy secret key generation [PDF]

open access: yes2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2017
22 pages, 1 figure, submitted to ISIT 2017.
Lin, Pin-Hsun   +2 more
openaire   +2 more sources

Finite time adaptive synchronous control for fractional‐order chaotic power systems

open access: yesIET Generation, Transmission & Distribution, 2023
As a complex non‐linear system, the chaotic oscillation of power system seriously threatens the safe and stable operation of power grids. In this paper, a finite time adaptive synchronization control method is proposed to mitigate the problem of chaotic ...
Chunyu Ai   +3 more
doaj   +1 more source

Thermodynamic Evaluation and Sensitivity Analysis of a Novel Compressed Air Energy Storage System Incorporated with a Coal-Fired Power Plant

open access: yesEntropy, 2020
A novel compressed air energy storage (CAES) system has been developed, which is innovatively integrated with a coal-fired power plant based on its feedwater heating system.
Peiyuan Pan   +5 more
doaj   +1 more source

Steady-state model of multi-port electric energy router and power flow analysis method of AC/DC hybrid system considering control strategies

open access: yesThe Journal of Engineering, 2019
This study proposes a steady-state model of multi-port electric energy router (EER) and a power flow analysis method for AC/DC hybrid system considering control strategies. Firstly, a circuit topology model of EER is put forward, including AC and DC port
Yu Shen   +6 more
doaj   +1 more source

New Physical Layer Key Generation Dimensions: Subcarrier Indices/Positions-Based Key Generation

open access: yesIEEE Communications Letters, 2021
In this letter, novel algorithms for secret key generation from the wireless channel in multi-carrier systems are proposed for ensuring the confidentiality and authentication in wireless communication systems. The novelty of the proposed algorithms lies in the generation of random secret bits not just from the magnitudes of orthogonal frequency ...
Haji M. Furqan   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy