Zobrazeno 1 - 10
of 72
pro vyhledávání: '"Kittichokechai, P."'
Autor:
Hoglund, Andreas, Mozaffari, Mohammad, Yang, Yanpeng, Moschetti, Giuseppe, Kittichokechai, Kittipong, Nory, Ravikiran
Enhancing the energy efficiency of devices stands as one of the key requirements in the fifth-generation (5G) cellular network and its evolutions toward the next generation wireless technology. Specifically, for battery-limited Internet-of-Things (Io
Externí odkaz:
http://arxiv.org/abs/2401.03333
Autor:
Moloudi, Saeedeh, Mozaffari, Mohammad, Veedu, Sandeep Narayanan Kadan, Kittichokechai, Kittipong, Wang, Y. -P. Eric, Bergman, Johan, Höglund, Andreas
The fifth generation (5G) wireless technology is primarily designed to address a wide range of use cases categorized into the enhanced mobile broadband (eMBB), ultra-reliable and low latency communication (URLLC), and massive machine-type communicati
Externí odkaz:
http://arxiv.org/abs/2101.07310
The 5th generation (5G) new radio (NR) is designed to support a wide range of use cases, requirements, and services from enhanced mobile broadband (eMBB) to ultra-reliable low-latency communications (URLLC). NR signals are designed to meet stringent
Externí odkaz:
http://arxiv.org/abs/2010.08829
Publikováno v:
IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 1945-1959 (Aug. 2018)
The problem of secret-key based authentication under a privacy constraint on the source sequence is considered. The identifier measurements during authentication are assumed to be controllable via a cost-constrained "action" sequence. Single-letter c
Externí odkaz:
http://arxiv.org/abs/1804.01430
Leveraging recent results in finite-blocklength information theory, we investigate the problem of designing a control channel in a 5G system. The setup involves the transmission, under stringent latency and reliability constraints, of a short data pa
Externí odkaz:
http://arxiv.org/abs/1801.10552
We consider problems of two-user secret key generation through an intermediate relay. Each user observes correlated source sequences and communicates to the relay over rate-limited noiseless links. The relay processes and broadcasts information to th
Externí odkaz:
http://arxiv.org/abs/1607.07674
We consider the problem of revealing/sharing data in an efficient and secure way via a compact representation. The representation should ensure reliable reconstruction of the desired features/attributes while still preserve privacy of the secret part
Externí odkaz:
http://arxiv.org/abs/1605.01880
Autor:
Kittichokechai P; Department of Cardiology, Boston Children's Hospital, Boston, MA, USA; Department of Pediatrics, Panyananthaphikkhu Chonprathan Medical Center, Srinakharinwirot University, Nonthaburi, Thailand., Sterling-Lovy S; Department of Cardiology, Boston Children's Hospital, Boston, MA, USA; Department of Pediatrics, Harvard Medical School, Boston, MA, USA., Lipsitz SR; Department of Cardiology, Boston Children's Hospital, Boston, MA, USA; Department of Pediatrics, Harvard Medical School, Boston, MA, USA., Sasaki N; Department of Cardiology, Boston Children's Hospital, Boston, MA, USA; Department of Pediatrics, Harvard Medical School, Boston, MA, USA., Baird CW; Department of Surgery, Boston Children's Hospital and Harvard Medical School, Boston, MA, USA., Chiu P; Department of Surgery, Boston Children's Hospital and Harvard Medical School, Boston, MA, USA., Zendejas B; Department of Surgery, Boston Children's Hospital and Harvard Medical School, Boston, MA, USA., Smalley RJ; Department of Radiology, Boston Children's Hospital and Harvard Medical School, Boston, MA, USA., Castellanos DA; Department of Cardiology, Boston Children's Hospital, Boston, MA, USA; Department of Pediatrics, Harvard Medical School, Boston, MA, USA. Electronic address: daniel.castellanos@cardio.chboston.org.
Publikováno v:
Journal of cardiovascular computed tomography [J Cardiovasc Comput Tomogr] 2024 Dec 13. Date of Electronic Publication: 2024 Dec 13.
We consider the problem of identification and authentication based on secret key generation from some user-generated source data (e.g., a biometric source). The goal is to reliably identify users pre-enrolled in a database as well as authenticate the
Externí odkaz:
http://arxiv.org/abs/1508.01295
We consider problems of authentication using secret key generation under a privacy constraint on the enrolled source data. An adversary who has access to the stored description and correlated side information tries to deceive the authentication as we
Externí odkaz:
http://arxiv.org/abs/1504.01614