Acquiring bloom filters across commercial rfids in physical layer

Z An, Q Lin, L Yang, W Lou, L Xie - IEEE/ACM Transactions on …, 2020 - ieeexplore.ieee.org
… into everyday objects to construct ubiquitous networks has … Thus, current system leaves
very limited space to improve the … We build a BF bit by bit, traversing the index from 0 to M − 1. …

Cross-Layer RF Distance Bounding Scheme for Passive and Semi-passive Ubiquitous Computing Systems

FM Khalil, A Fazil, MJ Hussain, A Masood - Computers & Security, 2024 - Elsevier
… The bit-by-bit reply (R prover ) is computed as R prover [k] = C verifier [k]… increased if the
prover's clock is slowed down. The RFID tags are a salient example of such vulnerable systems, …

[PDF][PDF] Enhanced Identification Algorithm Based on Dynamic Slots Collision Tracking in Radio Frequency Identification Systems.

YH Lin, CK Liang - Sensors & Materials, 2020 - pdfs.semanticscholar.org
… a scheme similar to the binary search algorithm for recognizing tags. … algorithm known as
the Improved Bit-by-bit Binary-Tree (IBBT) algorithm for use in ubiquitous identification systems

FPGA implementation of SSRS codes for NAND flash memory device

G Achala, S Nandana, F Jomy, MM Girish… - IEEE …, 2024 - ieeexplore.ieee.org
… have become increasingly ubiquitous due to increased data … Data storage capacity in these
devices has been increased … EXOR gates to perform bit-by-bit addition operations. Similarly, …

Quantum healthcare computing using precision based granular approach

L Aggarwal, S Sachdeva, P Goswami - Applied Soft Computing, 2023 - Elsevier
… faster than we can do bit by bit on Babylonian’s abacus device. … to improve the overall
efficiency of algorithms. Shor’s … So, it becomes clear that none of the algorithms is ubiquitous in …

A flexible and generic Gaussian sampler with power side-channel countermeasures for quantum-secure Internet of Things

C Zhang, Z Liu, Y Chen, J Lu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… (x) of the running CDT sampler bit by bit and finally infer the corresponding sampled value.
… Though the binary search algorithm can greatly improve the efficiency of CDT sampling and …

Secure Online Voting System Using Hybrid Post-Quantum Signatures

S Shriya, JD Sweetlin, V Supraja - … International Conference on …, 2024 - ieeexplore.ieee.org
… construction involves organizing these hashes in a binary tree … This research underscores
the efficiency and enhanced … Then, the hash is interpreted bit by bit. For each bit, the scheme …

Hakuin: Optimizing Blind SQL Injection with Probabilistic Language Models

J Pružinec, NA Quynh - 2023 IEEE Security and Privacy …, 2023 - ieeexplore.ieee.org
… is inefficient for natural languages used ubiquitously in DBs. … index to a binary representation,
and then infers it bit by bit. The … are unreliable and significantly increase the inference time. …

Optimization-based pseudo random key generation for fast encryption scheme

SA Shawkat, N Tagougui, M Kherallah - Bulletin of Electrical Engineering …, 2023 - beei.org
ubiquitous usage of the wireless networks and internet, the exploding expansion of consumer
devices, and improvements … with the key-stream bit-by-bit and produce cipher text. Figure 1 …

A survey of hardware self-organizing maps

S Jovanović, H Hikawa - … Networks and Learning Systems, 2022 - ieeexplore.ieee.org
… and trends for their ubiquitous adoption as hardware … inherent parallelism of the SOM algorithm
for better performances [4]–[28… The bit-serial winner determination is based on a bit-by-bit