• Publications
  • Influence
General requirements and security architecture for mobile phone anti-cloning measures
  • I. Gepko
  • Computer Science
  • IEEE EUROCON - International Conference on…
  • 2 November 2015
TLDR
The impressive number of counterfeit and stolen mobile phones as well as the emergence of applications where the authentication of mobile terminal is needed shows the critical importance of reliable protection of the mobile device identity. Expand
  • 5
Mobile phone multi-factor authentication with robustness of clone detection
  • S. Zhuk, I. Gepko
  • Computer Science
  • 13th International Conference on Modern Problems…
  • 1 February 2016
TLDR
In this paper, we formulate the basic requirements for the novel security architecture and introduce provable experience authentication factor of the mobile device which is dual with respect to the "social network" authentication factor. Expand
  • 2
Coding technique for out-of-band power emission reduction for multicarrier systems
  • Igor Gepko
  • Engineering
  • 10th International Symposium on Electromagnetic…
  • 15 November 2011
In this paper, we introduce a new method for out-of-band power reduction of multicarrier (MC) communication systems. Recent years MC systems possess a dominated role in wireless access due to theirExpand
  • 2
Properties of orthogonal signals with direct spectrum spreading based on perfect binary matrices and the algorithm of their correlation processing
A fast algorithm has been developed for digital correlation processing (correlation reception) of orthogonal signals formed on the basis of perfect binary matrices (PBM) using a modified circuit ofExpand
  • 1
Technical Configuration of Portable/Mobile TV White Space Devices: A Conceptual View
As is known, to eliminate interference, the frequency reuse approach is followed in Digital TV planning similar to cellular network, avoiding the use of the same channel in two neighboringExpand
Methods for constructing complete families of 36-element perfect binary arrays
A new algorithm is developed for synthesis of two families of 36-element perfect binary arrays (6x6 and 3x12), and the completeness of both families is proved. A method is derived for constructingExpand
Technical configuration of portable REF operating on the secondary basis in TV white spaces
This contribution describes the technical profile of upcoming cognitive devices operating on the secondary basis in digital TV frequency bands. A technique is proposed for determining the protectionExpand
Technical configuration of TV White Space Devices
  • Igor Gepko
  • Computer Science
  • IEEE EUROCON - International Conference on…
  • 2 November 2015
TLDR
We propose a novel approach where parameters required for protection of the primary system are calculated for a certain minimal separation distance observance of which for specific inhabited area could be ensured. Expand
Properties of orthogonal signals with direct spectrum spreading based on perfect binary matrices and the algorithm of their correlation processing
A fast algorithm has been developed for digital correlation processing (correlation reception) of orthogonal signals formed on the basis of perfect binary matrices (PBM) using a modified circuit ofExpand
The cross-correlation properties of generalized complementary sequences
The paper is devoted to the ensemble cross-correlation properties of periodic and negaperiodic complementary sequences. The prospects for their application as functions of spectrum expansion in CDMAExpand