Performance evaluation and adaptive optimization of COP-1: A case with security enhancement
暂无分享,去创建一个
[1] H. Ahmadi,et al. Throughput analysis of a class of selective repeat protocols in high-speed environments , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.
[2] Chaojing Tang,et al. Application and performance analysis of various AEAD techniques for space telecommand authentication , 2009, IEEE Transactions on Wireless Communications.
[3] David A. McGrew. Efficient authentication of large, dynamic data sets using Galois/counter mode (GCM) , 2005, Third IEEE International Security in Storage Workshop (SISW'05).
[4] E. O. Elliott. Estimates of error rates for codes on burst-noise channels , 1963 .
[5] John S. Baras,et al. An authentication framework for a hybrid satellite network with resource-constrained nodes , 2005, International Conference on Space Information Technology.
[6] Luciano Lenzini,et al. Analysis of Command Operation Procedures (COP's) for Reliable Data Transfer in the European Space Data Network , 1991, IEEE J. Sel. Areas Commun..
[7] Eytan Modiano,et al. An adaptive algorithm for optimizing the packet size used in wireless ARQ protocols , 1999, Wirel. Networks.
[8] Andreas Willig,et al. A new class of packet- and bit-level models for wireless channels , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[9] Susanna Spinsante,et al. New Perspectives in Telecommand Security: The Application of EAX to TC Segments , 2007 .
[10] E. Gilbert. Capacity of a burst-noise channel , 1960 .
[11] J. Gurland. Multidimensional Gaussian Distributions (Kenneth S. Miller) , 1966 .
[12] Quan Zhang,et al. A new method of enhancing telecommand security: the application of GCM in TC protocol , 2007, Other Conferences.