-
1
-
-
84933384775
-
The Software Radio Architecture
-
May
-
J. Mitola, "The Software Radio Architecture", IEEE Communications Magazine. vol. 33, pp. 26-38, May 1995.
-
(1995)
IEEE Communications Magazine
, vol.33
, pp. 26-38
-
-
Mitola, J.1
-
2
-
-
0032646623
-
Mode Switching and Software Download for Software Defined Radio: The SDR Forum Approach
-
August
-
M. Cummings and S. Heath. "Mode Switching and Software Download for Software Defined Radio: The SDR Forum Approach", IEEE Communications Magazine, vol. 37, pp. 104-106, August 1999.
-
(1999)
IEEE Communications Magazine
, vol.37
, pp. 104-106
-
-
Cummings, M.1
Heath, S.2
-
3
-
-
0035249933
-
Evolution Toward Reconfigurable User Equipment
-
Feb.
-
N.J. Drew and M.M. Dillinger, "Evolution Toward Reconfigurable User Equipment", IEEE Communications Magazine, vol. 39. pp. 158-164, Feb. 2001.
-
(2001)
IEEE Communications Magazine
, vol.39
, pp. 158-164
-
-
Drew, N.J.1
Dillinger, M.M.2
-
4
-
-
0035416647
-
Reconfigurable Terminals: An Overview of Architectural Solutions
-
August
-
M. Mehta, N. Drew. G. Vardoulias, N. Greco and C. Niedermeier, "Reconfigurable Terminals: An Overview of Architectural Solutions", IEEE Communications Magazine, vol. 39, pp. 82-89, August 2001.
-
(2001)
IEEE Communications Magazine
, vol.39
, pp. 82-89
-
-
Mehta, M.1
Drew, N.2
Vardoulias, G.3
Greco, N.4
Niedermeier, C.5
-
5
-
-
0035416499
-
Research and Developments of Software-Defined Radio Technologies in Japan
-
August
-
N. Nakajima. R. Kohno and S. Kubota, "Research and Developments of Software-Defined Radio Technologies in Japan", IEEE Communications Magazine, vol. 39, pp. 146-155, August 2001.
-
(2001)
IEEE Communications Magazine
, vol.39
, pp. 146-155
-
-
Nakajima, N.1
Kohno, R.2
Kubota, S.3
-
7
-
-
0036646444
-
A Framework for Secure Downolad for Software Defined Radio
-
July
-
L.B. Michael.M.J. Mihaljević, S. Haruyama and R. Kahno,, "A Framework for Secure Downolad for Software Defined Radio", IEEE Communications Magazine. vol. 40, July 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
-
-
Michael, L.B.1
Mihaljević, M.J.2
Haruyama, S.3
Kahno, R.4
-
9
-
-
0009771171
-
Software Defined Radio Prototype for PHS and Wireless LAN Systems (I) - System Design and Over-the-air-Download
-
SR01-12(2001-10), Sept.
-
H. Shiba at. al., "Software Defined Radio Prototype for PHS and Wireless LAN Systems (I) - System Design and Over-the-air-Download", Tecnical Report of IEICE, SR01-12(2001-10),pp. 33-38, Sept. 2001.
-
(2001)
Tecnical Report of IEICE
, pp. 33-38
-
-
Shiba, H.1
-
10
-
-
0034507799
-
Flexible Security Systems and a New Structure for Electronic Commerce on Software Radio
-
Proceedings, Sept.
-
M. Sugita, K. Uehara and S. Kubota, "Flexible Security Systems and a New Structure for Electronic Commerce on Software Radio", 52nd IEEE Vehicular Technology Conference. Proceedings. vol. 6, pp. 3033-3040, Sept. 2000.
-
(2000)
52nd IEEE Vehicular Technology Conference
, vol.6
, pp. 3033-3040
-
-
Sugita, M.1
Uehara, K.2
Kubota, S.3
-
11
-
-
79955516375
-
Securely Reconfigurable Terminals
-
September
-
R. Falk and N. Grew, "Securely Reconfigurable Terminals", Proceedings, 1st Mobile Communications Summit 2001, Barcelona, Spain, September 2001.
-
(2001)
Proceedings, 1st Mobile Communications Summit 2001, Barcelona, Spain
-
-
Falk, R.1
Grew, N.2
-
12
-
-
84880901653
-
The Order of Encryption and Authentication for Protecting Communications (or: How Secure is SSL)
-
Advance in Cryptology - CRYPTO 2001
-
H. Krawczyck, "The Order of Encryption and Authentication for Protecting Communications (or: How Secure is SSL)", Advance in Cryptology - CRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, pp. 310-331, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 310-331
-
-
Krawczyck, H.1
-
13
-
-
84949223752
-
Weaknesses in the Key Scheduling Algorithm of RC4
-
Selected Areas in Cryptogaphy - SAC2001
-
S. Fluhrer, I. Mantin and A. Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4", Selected Areas in Cryptogaphy - SAC2001, Lecture Notes in Computer Science, vol. 2259, pp. 1-24, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
15
-
-
84974707207
-
Real Time Cryptanalysis of A5/1 on a PC
-
Fast Software Encryption - FSEZ000
-
A. Biryukov, A. Shamir and D. Wagner, "Real Time Cryptanalysis of A5/1 on a PC", Fast Software Encryption - FSEZ000. Lecture Notes in Computer Science, vol. 1978. pp. 1-18, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1978
, pp. 1-18
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
16
-
-
0009792703
-
On Wireless Communications Privacy and Security Evaluation of Encryption Techniques
-
Proceedings, March
-
M.J. Mihaljević and R. Kohno. "On Wireless Communications Privacy and Security Evaluation of Encryption Techniques", IEEE Wireless Comm. and Net. Conf. - WCNC2002, Proceedings, 865-868, March 2002.
-
(2002)
IEEE Wireless Comm. and Net. Conf. - WCNC2002
, pp. 865-868
-
-
Mihaljević, M.J.1
Kohno, R.2
-
18
-
-
0004269186
-
-
John Wley and Sans Inc., 2nd Edition
-
B. Schneier, Applied Cyptography. John Wley and Sans Inc., 2nd Edition, 1995.
-
(1995)
Applied Cyptography
-
-
Schneier, B.1
|