搜索结果: 1-15 共查到“Relay”相关记录61条 . 查询时间(0.041 秒)
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
authentication protocol relay attacks side-channel attacks
2019/1/9
Relay attacks are nowadays well known and most designers of secure authentication protocols are aware of them. At present, the main methods to prevent these attacks are based on the so-called distance...
Another Look at Relay and Distance-based Attacks in Contactless Payments
Contactless Payments EMV-adaptations
2018/5/3
Relay attacks on contactless e-payments were demonstrated in 2015. Since, countermeasures have been proposed and Mastercard has recently adopted a variant of these in their specifications. These relay...
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks
secure ranging physical layer security
2017/12/25
Physical layer attacks allow attackers to manipulate (spoof) ranging and positioning. These attacks had real world impact and allowed car thefts, executions of unauthorised payments and manipulation o...
Switchable DNA mini-machines relay information
Switchable DNA mini-machines relay information
2017/7/24
The DNA arrays’ structures look like accordion-style retractable security gates.Extending or contracting one unit pushes nearby units to change shape as well, working like a domino cascade whose tiles...
2017年第70届继电保护器工程师大会(2017 70th Annual Conference for Protective Relay Engineers)
2017年 第70届 继电保护器 工程师 大会
2017/3/13
For 70 years the Annual Conference for Protective Relay Engineers has provided the best available information on protective relay applications and technology. With the changes that have occurred in th...
Detecting Races in Relay Ladder Logic Programs
Detecting Races Relay Ladder Logic Programs
2016/5/24
Relay Ladder Logic (RLL) [4] is a programming language widely used for complex embedded control applications such as manufacturing and amusement park rides. The cost of bugs in RLL programs is extreme...
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
Tor Proof of Work Crypto-currency
2016/1/5
In this paper we propose a new micropayments scheme which
can be used to reward Tor relay operators. Tor clients do not pay Tor
relays with electronic cash directly but submit proof of work shares w...
Optimized Noisy Network Coding for Gaussian Relay Networks
Optimized Noisy Network Gaussian Relay Networks
2015/8/17
In this paper, we provide an improved lower bound on the rate achieved by noisy network coding in arbitrary Gaussian relay networks, whose gap to the cutset upper bound depends on the network not only...
A 3-node lossy source coding problem for a 2-DMS(X1, X2) is considered. Source nodes 1 and 2 observe X1 and X2, respectively, and each wishes to reconstruct the other source with a prescribed distorti...
Relay with Side Information
Relay Side Information
2015/8/17
This paper establishes necessary and sufficient conditions for reliable transmission of a source over a relay channel when source side information is available non-causally (a) only at V3 the receiver...
On Information Flow in Relay Networks.
A relay channel consists of an input x,, a relay output yl, a cJmnnel output y, and a relay sender x2 (whose trasmission is allowed to depend on the past symbols y,). l%e dependence of the received sy...
The Capacity of the Semideterministic Relay Channel.
Capacity of a Class of Relay Channels With Orthogonal Components
Additive white Gaussian noise (AWGN) relay channel discrete memoryless relay channel
2015/8/12
The capacity of a class of discrete-memoryless relay channels with orthogonal channels from the sender to the relay receiver and from the sender and relay to the receiver is shown to be equal to the m...
Bounds on Capacity and Minimum Energy-Per-Bit for AWGN Relay Channels
Additive white Gaussian noise (AWGN) channels channel capacity minimum energy-per-bit relay channel
2015/8/12
Upper and lower bounds on the capacity and minimum energy-per-bit for general additive white Gaussian noise (AWGN) and frequency-division AWGN (FD-AWGN) relay channel models are established. First, th...