NTT Communication Science Laboratories

Displaying 1-2 of 2 results

  • White Papers // Oct 2012

    Computationally Complete Symbolic Attacker in Action

    The authors show that the recent technique of computationally complete symbolic attackers proposed by Bana and Comon-Lundh for computationally sound verification of security protocols is powerful enough to verify actual protocols. In their paper, Bana and Comon-Lundh presented only the general framework, but they did not introduce sufficiently many axioms...

    Provided By NTT Communication Science Laboratories

  • White Papers // Mar 2012

    Indoor Experiments on Real-Time Multiuser MIMO Transmission in Wireless LAN Systems

    This paper presents indoor experimental results on an implemented real-time DownLink MultiUser Multiple-Input Multiple-Output (DL-MU-MIMO) transceiver for next generation wireless LAN systems. In the transceiver, Channel State Information (CSI) is estimated at each STAtion (STA) and fed back to an Access Point (AP) on a real-time basis. At the AP,...

    Provided By NTT Communication Science Laboratories

  • White Papers // Mar 2012

    Indoor Experiments on Real-Time Multiuser MIMO Transmission in Wireless LAN Systems

    This paper presents indoor experimental results on an implemented real-time DownLink MultiUser Multiple-Input Multiple-Output (DL-MU-MIMO) transceiver for next generation wireless LAN systems. In the transceiver, Channel State Information (CSI) is estimated at each STAtion (STA) and fed back to an Access Point (AP) on a real-time basis. At the AP,...

    Provided By NTT Communication Science Laboratories

  • White Papers // Oct 2012

    Computationally Complete Symbolic Attacker in Action

    The authors show that the recent technique of computationally complete symbolic attackers proposed by Bana and Comon-Lundh for computationally sound verification of security protocols is powerful enough to verify actual protocols. In their paper, Bana and Comon-Lundh presented only the general framework, but they did not introduce sufficiently many axioms...

    Provided By NTT Communication Science Laboratories