Arama Sonuçları

Listeleniyor 1 - 2 / 2
  • Yayın
    A novel method to design wideband power amplifier for wireless communication
    (IEEE, 2013) Köprü, Ramazan; Kuntman, Hulusi Hakan; Yarman, Bekir Sıddık Binboğa
    A new approach is presented to design microwave amplifiers to deliver maximum output power using Simplified Real Frequency Technique (SRFT). Proposed method tracks the maximum stable gain (MSG) curve of the active device (BJT, FET etc.) under consideration. Maximum Stable Gain Amplifier (MSGA) possesses higher gain than that of the constant or Flat Gain Amplifier (FGA) along the operating frequency band. Compared to FGA, it is this feature that makes MSGA high efficiency and low DC power consumption amplifier. Employing the proposed design method, a MSG power amplifier is constructed over the frequency band of 800-5200 MHz which can be utilized for GSM, UMTS, Wi-Fi and Wi-MAX applications.
  • Yayın
    SIMSec: A key exchange protocol between SIM card and service provider
    (Springer New York LLC, 2016-08-01) Ok, Kerem; Coşkun, Vedat; Yarman, Bekir Sıddık Binboğa; Çevikbaş, Cem; Özdenizci Köse, Büşra
    Mobile technology is so popular and overdosed adoption is inevitable in today’s world. As the mobile technologies have advanced, Service Providers (SP) have offered services via Smartphones and some of them required secure data communication between the Subscriber Identity Module (SIM) cards on Smartphones and the servers of SP. The latest SIM cards comply with recent specifications including secure domain generation, mobile signatures, pre-installed encryption keys, and other useful security services. Nevertheless, un-keyed SIM cards do not satisfy such requirements, thus end-to-end encryption between the SIM card and SP cannot be provided. In this paper, we provide a key exchange protocol, which creates a symmetric key through the collaborative work of the SIM card and the SP server. After a successful protocol performance, the SIM card and SP can perform end-to-end data encryption. After defining the protocol, we also discuss the security issues and provide a formal security analysis of the protocol using the Casper/FDR tool.