TRUSTED AND ANONYMOUS AUTHENTICATION SCHEME FOR WIRELESS NETWORKS

Trusted and anonymous authentication scheme for wireless networks

A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one ce lancer headlights time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme is security and reliability, it can provide identity anonymity and platform

read more

A Novel Interference Suppression Method for Interrupted Sampling Repeater Jamming Based on Singular Spectrum Entropy Function

As a new type of jamming, the interrupted sampling repeater jamming (ISRJ) derived from the digital radio frequency memory (DRFM) technology, can generate coherent multiple false targets after pulse compression.At present, the traditional interference suppression method and its improved methods have insufficient characteristics and poor detection p

read more