-
1
-
-
85032751965
-
Compressive sensing [lecture notes]
-
Jul.
-
R. G. Baraniuk, Compressive sensing [lecture notes], " IEEE Signal Process. Mag., vol. 24, no. 4, pp. 118-121, Jul. 2007.
-
(2007)
IEEE Signal Process. Mag.
, vol.24
, Issue.4
, pp. 118-121
-
-
Baraniuk, R.G.1
-
3
-
-
79955744825
-
Energy-ef-cient data acquisition in wireless sensor networks using compressed sensing
-
Mar.
-
M. Sartipi and R. Fletcher, Energy-ef-cient data acquisition in wireless sensor networks using compressed sensing, " in Proc. Data Compress. Conf. (DCC), Mar. 2011, pp. 223-232.
-
(2011)
Proc. Data Compress. Conf. (DCC)
, pp. 223-232
-
-
Sartipi, M.1
Fletcher, R.2
-
4
-
-
84856094267
-
Non-uniform compres-sive sensing
-
Sep.
-
N. Rahnavard, A. Talari, and B. Shahrasbi, Non-uniform compres-sive sensing, " in Proc. 49th Annu. Allerton Conf. Commun., Control, Comput. (Allerton), Sep. 2012, pp. 212-219.
-
(2012)
Proc. 49th Annu. Allerton Conf. Commun., Control, Comput. (Allerton)
, pp. 212-219
-
-
Rahnavard, N.1
Talari, A.2
Shahrasbi, B.3
-
5
-
-
33645004780
-
The NTMAC for authentication of noisy messages
-
Mar.
-
C. G. Boncelet, Jr., The NTMAC for authentication of noisy messages, " IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 35-42, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 35-42
-
-
Boncelet, C.G.1
-
6
-
-
79957844692
-
Soft correction and veri-cation of the messages protected by cryptographic check values
-
Mar.
-
N. Zivic, Soft correction and veri-cation of the messages protected by cryptographic check values, " in Proc. 45th Annu. Conf. Inf. Sci. Syst., Mar. 2013, pp. 1-6.
-
(2013)
Proc. 45th Annu. Conf. Inf. Sci. Syst.
, pp. 1-6
-
-
Zivic, N.1
-
7
-
-
84861182125
-
On joint cryptographic veri-cation and channel decoding via the maximum likelihood criterion
-
May
-
N. Zivic and M. F. Flanagan, On joint cryptographic veri-cation and channel decoding via the maximum likelihood criterion, " IEEE Commun. Lett., vol. 16, no. 5, pp. 717-719, May 2013.
-
(2013)
IEEE Commun. Lett.
, vol.16
, Issue.5
, pp. 717-719
-
-
Zivic, N.1
Flanagan, M.F.2
-
9
-
-
11244354854
-
Security Considerations for IEEE 802. 15. 4 Networks
-
N. Sastry and D. Wagner, Security considerations for IEEE 802. 15. 4 networks, " in Proc. 3rd ACM Workshop Wireless Security, New York, NY, USA, 2004, pp. 32-42.
-
(2004)
Proc. 3rd ACM Workshop Wireless Security New York, NY USA
, pp. 32-42
-
-
Sastry, N.1
Wagner, D.2
-
10
-
-
84878844326
-
-
[Online]. Available
-
(2005). SKIPJACK and KEA Algorithm Speci-cations. [Online]. Available: http://csrc. nist. gov/CryptoToolkit/skipjack/skipjack. pdf
-
(2005)
SKIPJACK and KEA Algorithm Speci-cations
-
-
-
11
-
-
12344281198
-
Cryptography using multiple one-dimensional chaotic maps
-
N. K. Pareek, V. Patidar, and K. K. Sud, Cryptography using multiple one-dimensional chaotic maps, " Commun. Nonlinear Sci. Numer. Simul., vol. 10, no. 7, pp. 715-723, 2005.
-
(2005)
Commun. Nonlinear Sci. Numer. Simul.
, vol.10
, Issue.7
, pp. 715-723
-
-
Pareek, N.K.1
Patidar, V.2
Sud, K.K.3
-
12
-
-
77952236404
-
A fast image encryption and authentication scheme based on chaotic maps
-
H. Yang, K.-W. Wong, X. Liao, W. Zhang, and P. Wei, A fast image encryption and authentication scheme based on chaotic maps, " Commun. Nonlinear Sci. Numer. Simul., vol. 15, no. 11, pp. 3507-3517, 2010.
-
(2010)
Commun. Nonlinear Sci. Numer. Simul.
, vol.15
, Issue.11
, pp. 3507-3517
-
-
Yang, H.1
Wong, K.-W.2
Liao, X.3
Zhang, W.4
Wei, P.5
-
13
-
-
80054946483
-
Block permutation cipher in chaos with Feistel struc-ture for wireless sensor networks
-
Jul.
-
S. Chen and R. Shu, Block permutation cipher in chaos with Feistel struc-ture for wireless sensor networks, " J. Adv. Intell. Soft Comput., vol. 105, pp. 391-396, Jul. 2011.
-
(2011)
J. Adv. Intell. Soft Comput.
, vol.105
, pp. 391-396
-
-
Chen, S.1
Shu, R.2
-
14
-
-
67349197413
-
Logistic chaotic maps for binary numbers generations
-
A. Kanso and A. Smaoui, Logistic chaotic maps for binary numbers generations, " Chaos, Solitons Fractals, vol. 40, no. 5, pp. 2557-2568, 2009.
-
(2009)
Chaos, Solitons Fractals
, vol.40
, Issue.5
, pp. 2557-2568
-
-
Kanso, A.1
Smaoui, A.2
-
16
-
-
85032766716
-
Compressed sens-ing for networked data
-
Mar.
-
J. Haupt, W. U. Bajwa, M. Rabbat, and R. Nowak, Compressed sens-ing for networked data, " IEEE Signal Process. Mag., vol. 25, no. 2, pp. 92-101, Mar. 2008.
-
(2008)
IEEE Signal Process. Mag.
, vol.25
, Issue.2
, pp. 92-101
-
-
Haupt, J.1
Bajwa, W.U.2
Rabbat, M.3
Nowak, R.4
-
17
-
-
62349119084
-
On the security and robustness of encryption via compressed sensing
-
Nov.
-
A. Orsdemir, H. O. Altun, G. Sharma, and M. F. Bocko, On the security and robustness of encryption via compressed sensing, " in Proc. IEEE Military Commun. Conf., Nov. 2008, pp. 1-7.
-
(2008)
Proc. IEEE Military Commun. Conf.
, pp. 1-7
-
-
Orsdemir, A.1
Altun, H.O.2
Sharma, G.3
Bocko, M.F.4
-
18
-
-
80051993020
-
-
Release V-2004. 06, Synopsys, Inc., Mountain View, CA, USA, Jun.
-
Power Compiler User Guide Manual, Release V-2004. 06, Synopsys, Inc., Mountain View, CA, USA, Jun. 2004.
-
(2004)
Power Compiler User Guide Manual
-
-
|