Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Kittichokechai, P."'
Autor:
Hoglund, Andreas, Mozaffari, Mohammad, Yang, Yanpeng, Moschetti, Giuseppe, Kittichokechai, Kittipong, Nory, Ravikiran
Enhancing the energy efficiency of devices stands as one of the key requirements in the fifth-generation (5G) cellular network and its evolutions toward the next generation wireless technology. Specifically, for battery-limited Internet-of-Things (Io
Externí odkaz:
http://arxiv.org/abs/2401.03333
Autor:
Moloudi, Saeedeh, Mozaffari, Mohammad, Veedu, Sandeep Narayanan Kadan, Kittichokechai, Kittipong, Wang, Y. -P. Eric, Bergman, Johan, Höglund, Andreas
The fifth generation (5G) wireless technology is primarily designed to address a wide range of use cases categorized into the enhanced mobile broadband (eMBB), ultra-reliable and low latency communication (URLLC), and massive machine-type communicati
Externí odkaz:
http://arxiv.org/abs/2101.07310
The 5th generation (5G) new radio (NR) is designed to support a wide range of use cases, requirements, and services from enhanced mobile broadband (eMBB) to ultra-reliable low-latency communications (URLLC). NR signals are designed to meet stringent
Externí odkaz:
http://arxiv.org/abs/2010.08829
Publikováno v:
IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 1945-1959 (Aug. 2018)
The problem of secret-key based authentication under a privacy constraint on the source sequence is considered. The identifier measurements during authentication are assumed to be controllable via a cost-constrained "action" sequence. Single-letter c
Externí odkaz:
http://arxiv.org/abs/1804.01430
Leveraging recent results in finite-blocklength information theory, we investigate the problem of designing a control channel in a 5G system. The setup involves the transmission, under stringent latency and reliability constraints, of a short data pa
Externí odkaz:
http://arxiv.org/abs/1801.10552
We consider problems of two-user secret key generation through an intermediate relay. Each user observes correlated source sequences and communicates to the relay over rate-limited noiseless links. The relay processes and broadcasts information to th
Externí odkaz:
http://arxiv.org/abs/1607.07674
We consider the problem of revealing/sharing data in an efficient and secure way via a compact representation. The representation should ensure reliable reconstruction of the desired features/attributes while still preserve privacy of the secret part
Externí odkaz:
http://arxiv.org/abs/1605.01880
We consider the problem of identification and authentication based on secret key generation from some user-generated source data (e.g., a biometric source). The goal is to reliably identify users pre-enrolled in a database as well as authenticate the
Externí odkaz:
http://arxiv.org/abs/1508.01295
We consider problems of authentication using secret key generation under a privacy constraint on the enrolled source data. An adversary who has access to the stored description and correlated side information tries to deceive the authentication as we
Externí odkaz:
http://arxiv.org/abs/1504.01614
Autor:
Saeedeh Moloudi, Mohammad Mozaffari, Sandeep Narayanan Kadan Veedu, Kittipong Kittichokechai, Y.-P. Eric Wang, Johan Bergman, Andreas Hoglund
Publikováno v:
IEEE Access, Vol 9, Pp 45055-45067 (2021)
The fifth-generation (5G) wireless technology is primarily designed to address a wide range of use cases categorized into the enhanced mobile broadband (eMBB), ultra-reliable and low latency communication (URLLC), and massive machine-type communicati
Externí odkaz:
https://doaj.org/article/325919bcec1e44838bf37c8a0d358c2a