Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,861 papers from all fields of science
Search
Sign In
Create Free Account
TLS-PSK
Known as:
TLS PSK
Transport Layer Security pre-shared key ciphersuites (TLS-PSK) is a set of cryptographic protocols that provide secure communication based on pre…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Authentication
Cryptographic protocol
Intel AMT versions
Intel Active Management Technology
Expand
Broader (1)
Secure communication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Phase-shift keying of EEG signals: Application to detect attention in multitalker scenarios
M. A. Lopez-Gordo
,
F. Pelayo
,
E. Fernández
,
P. Padilla
Signal Processing
2015
Corpus ID: 3854544
2012
2012
Analytical Performance of M-PSK Communications Systems in the Presence of Gain/Phase Imbalances and DC-Offsets
Zhiwen Zhu
,
Xinping Huang
,
M. Caron
IEEE Wireless Communications Letters
2012
Corpus ID: 22657543
This letter addresses the performance of M-PSK communications systems in the presence of gain/phase imbalances and DC-offsets in…
Expand
2010
2010
EMV support for TLS-PSK
P. Urien
2010
Corpus ID: 168256983
This draft describes an authentication protocol based on TLS pre shared key (TLS-PSK), RFC 4279. Identity and psk attributes…
Expand
2010
2010
Introducing TLS-PSK authentication for EMV devices
P. Urien
International Symposium on Collaborative…
2010
Corpus ID: 34368203
Access control to online banking accounts is a very critical topic for the always-on emerging society. In order to avoid phising…
Expand
2009
2009
Simulation Evaluation of BER Characteristics for M-PSK and M-QAM Modulations used in the Reverse Channel of Cable TV Nets
S. Sadinov
,
K. Koichev
,
P. Penchev
,
K. Angelov
2009
Corpus ID: 62831714
A profile is drawn for the various types of square modulations, which are used in transmitting digital signals in the reverse…
Expand
2009
2009
Opportunistic Scheduling and Adaptive Modulation in Wireless Networks with Network Coding
Seong-Lyong Gong
,
Byung-Gook Kim
,
Jang-Won Lee
IEEE Vehicular Technology Conference
2009
Corpus ID: 3056167
So far, many researches on network coding are performed with higher layer protocols such as MAC, routing, and flow control…
Expand
2007
2007
The EAP-TLS-PSK Authentication Protocol
Thomas Otto
,
H. Tschofenig
2007
Corpus ID: 63398542
The Extensible Authentication Protocol (EAP), defined in RFC 3748, is a network access authentication framework which provides…
Expand
Highly Cited
2004
Highly Cited
2004
Totally blind channel estimation for OFDM on fast varying mobile radio channels
M. Necker
,
Gordon L. Stüber
IEEE Transactions on Wireless Communications
2004
Corpus ID: 14863773
A new blind channel estimation scheme for orthogonal frequency division multiplexing systems is proposed based on the maximum…
Expand
2001
2001
Quasi-synchronous code-division multiple access with high-order modulation
W. J. V. Houtum
IEEE Transactions on Communications
2001
Corpus ID: 42702746
Code-division multiple access (CDMA) is a multiplexing technique where a number of users simultaneously access a transmission…
Expand
Highly Cited
1997
Highly Cited
1997
Symbol-by-symbol MAP demodulation of CPM and PSK signals on Rayleigh flat-fading channels
M. Gertsman
,
J. Lodge
IEEE Transactions on Communications
1997
Corpus ID: 15892320
Demodulation using the symbol-by-symbol maximum a posteriori probability (MAP) algorithm is presented. The algorithm is derived…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required