— It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypt...
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags)...
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels
— In order to identify if a subscriber loop is suitable for a certain Digital Subscriber Line (DSL) service, the transfer function of the loop has to be estimated. Several measur...
— We propose the quality-of-service (QoS) driven power allocation schemes for parallel fading channels when considering imperfect channel estimations. In particular, the parallel...
In this paper we present a new approach to model the effect of virtual channel multiplexing in high-speed interconnection networks. Previous studies have used a method proposed by...
Nasser Alzeidi, Ahmad Khonsari, Mohamed Ould-Khaou...