A search algorithm for the detection of a direct path signal in the presence of dense multipath in indoor environment using UWB is Woposed. This algorithm is based on signal correlation and differential coefficient. S...A search algorithm for the detection of a direct path signal in the presence of dense multipath in indoor environment using UWB is Woposed. This algorithm is based on signal correlation and differential coefficient. Statistical analysis of the algorithm is given out and computer simulation results are presented to validate the effectiveness of the algorithm. The results based on the algorithm pml3osed are compared with those based on Maximum Likelihood Estimator(MLE) and Peak Tracking(PT) in the simulation which shows that this algorithm achieves the highest accuracy in most cases and gives out relatively stable results in different Signal Noise Ratio(SNR).展开更多
A scheme of chaotic secure communication based on the parameter modulation and the inversion of a chaotic dynamical system is analyzed. According to this scheme, information signal is modulated by a bifurcation parame...A scheme of chaotic secure communication based on the parameter modulation and the inversion of a chaotic dynamical system is analyzed. According to this scheme, information signal is modulated by a bifurcation parameter of the transmitter, which is in chaotic state. In the receiver, a proportional integral feedback demodulator is used to demodulate the information signal, which only uses the available synchronizing error as well as stateness of receiver. The purpose of this demodulator is proposed to overcome the influence of differentiation operation, nonlinear part and singularities in chaotic system. Numerical simulation is proposed to show the effectiveness of this demodulator.展开更多
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall...Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.展开更多
We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our ...We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our scheme simple and safe.The operations which are needed to recover secret message,are only exclusive-or addition and complement operation.Moreover it is shown that this scheme is secure against eavesdropping.Also this scheme provides the best quantum bit efficiency compared with some famous quantum secret sharing schemes.展开更多
基金Supported by the Education Depart ment Fund of Science and Technology Research (No.104086)
文摘A search algorithm for the detection of a direct path signal in the presence of dense multipath in indoor environment using UWB is Woposed. This algorithm is based on signal correlation and differential coefficient. Statistical analysis of the algorithm is given out and computer simulation results are presented to validate the effectiveness of the algorithm. The results based on the algorithm pml3osed are compared with those based on Maximum Likelihood Estimator(MLE) and Peak Tracking(PT) in the simulation which shows that this algorithm achieves the highest accuracy in most cases and gives out relatively stable results in different Signal Noise Ratio(SNR).
文摘A scheme of chaotic secure communication based on the parameter modulation and the inversion of a chaotic dynamical system is analyzed. According to this scheme, information signal is modulated by a bifurcation parameter of the transmitter, which is in chaotic state. In the receiver, a proportional integral feedback demodulator is used to demodulate the information signal, which only uses the available synchronizing error as well as stateness of receiver. The purpose of this demodulator is proposed to overcome the influence of differentiation operation, nonlinear part and singularities in chaotic system. Numerical simulation is proposed to show the effectiveness of this demodulator.
文摘Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.
文摘We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our scheme simple and safe.The operations which are needed to recover secret message,are only exclusive-or addition and complement operation.Moreover it is shown that this scheme is secure against eavesdropping.Also this scheme provides the best quantum bit efficiency compared with some famous quantum secret sharing schemes.