We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
One of the challenges in development of embedded systems is to cope with hardware and software components simultaneously. Often is their integration cumbersome due to their incomp...
The purpose of room impulse response (RIR) shortening is to improve the intelligibility of the received signal by prefiltering the source signal before it is played with a loudsp...
—In this paper we analyze the capacity of wireless mesh networks that use omni or directional antennas. The capacity in our analysis is the end-to-end per-node throughput. Our an...
Abstract. We prove a uniformly computable version of de Finetti’s theorem on exchangeable sequences of real random variables. In the process, we develop machinery for computably ...