Author of the publication

Capacity investigation of on-off keying in noncoherent channel settings at low SNR.

, , and . Trans. Emerging Telecommunications Technologies, 26 (11): 1235-1250 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secret rate - Privacy leakage in biometric systems., and . ISIT, page 2251-2255. IEEE, (2009)Authentication based on secret-key generation., and . ISIT, page 1792-1796. IEEE, (2012)Square Root approximation to the Poisson Channel., , and . ISIT, page 1695-1699. IEEE, (2013)Privacy-leakage codes for biometric authentication systems., and . ICASSP, page 1601-1605. IEEE, (2014)Capacity investigation of on-off keying in noncoherent channel settings at low SNR., , and . Trans. Emerging Telecommunications Technologies, 26 (11): 1235-1250 (2015)Biometric systems: privacy and secrecy aspects., and . IEEE Trans. Information Forensics and Security, 4 (4): 956-973 (2009)Information leakage in fuzzy commitment schemes., and . IEEE Trans. Information Forensics and Security, 5 (2): 337-348 (2010)Context weighting for general finite-context sources., , and . IEEE Trans. Information Theory, 42 (5): 1514-1520 (1996)A universal variable-to-fixed length source code based on Lawrence's algorithm., and . IEEE Trans. Information Theory, 38 (2): 247-253 (1992)Coding for a binary independent piecewise-identically-distributed source.. IEEE Trans. Information Theory, 42 (6): 2210-2217 (1996)