Frequency Hopping Spread Spectrum Security Improvement with Encrypted Spreading Codes in a Partial Band Noise Jamming Environment
暂无分享,去创建一个
[1] Jitendra K. Tugnait,et al. Blind detection of asynchronous CDMA signals in multipath channels using code-constrained inverse filter criteria , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[2] Jovan Dj. Golic,et al. Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers , 1995, EUROCRYPT.
[3] Burton S. Kaliski,et al. On the Security of the RC5 Encryption Algorithm , 1998 .
[4] Jitendra K. Tugnait,et al. Blind detection of asynchronous CDMA signals in multipath channels using code-constrained inverse filter criterion , 2001, IEEE Trans. Signal Process..
[5] Litao Gang,et al. Security and synchronization in watermark sequence , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[6] Tongtong Li,et al. Physical layer built-in security enhancement of DS-CDMA systems using secure block interleaving , 2004 .
[7] Ismail Mansour,et al. Security architecture for wireless sensor networks using frequency hopping and public key management , 2011, 2011 International Conference on Networking, Sensing and Control.
[8] Xiaodong Xu. Blind estimation of PN code in multipath fading direct sequence spread spectrum systems , 2008, 2008 11th IEEE International Conference on Communication Technology.
[9] Abolfazl Falahati,et al. Improving code division multiple access security by applying encryption methods over the spreading codes , 2007, IET Commun..
[10] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[11] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .