Results 11 to 20 of about 769,138 (291)
Large-Scale Multicast Group Secure Transmission Scheme Based on Multi-Carrier FDA
Aiming at the problem that the traditional physical layer technology cannot realize secure transmission due to the large number of users and wide dispersion in the multicast system, a layered transmission method is proposed, and a scheme for the secure ...
Dan Wu +4 more
doaj +1 more source
Antenna Grouping-Based Blind Artificial Noise for TDD Secure Transmission
The artificial noise (AN-) aided techniques have been considered as promising candidates to enhance the physical layer security. However, the effect of AN on an eavesdropper (Eve) can be severely degraded as the number of antennas at Eve increases.
Hyukmin Son, Sangjoon Park
doaj +1 more source
Practical Secrecy using Artificial Noise [PDF]
In this paper, we consider the use of artificial noise for secure communications. We propose the notion of practical secrecy as a new design criterion based on the behavior of the eavesdropper's error probability $P_E$, as the signal-to-noise ratio goes to infinity.
Liu, Shuiyin +2 more
openaire +2 more sources
Secrecy Performance of a Multi-NOMA-MIMO System in the UEH Relaying Network Using the PSO Algorithm
In this paper, we investigate the secrecy performance of the nonorthogonal multiple access (NOMA) system in an untrusted relaying energy harvesting (UEH) network with the multiple-input multiple-output (MIMO) architecture using the maximum ratio ...
Thi Le Anh, Ic Pyo Hong
doaj +1 more source
Secure Transmission of Terahertz Signals with Multiple Eavesdroppers
The terahertz (THz) band is expected to become a key technology to meet the ever-increasing traffic demand for future 6G wireless communications, and a lot of efforts have been paid to develop its capacity.
Yuqian He +4 more
doaj +1 more source
Color-decoupled photo response non-uniformity for digital image forensics [PDF]
The last few years have seen the use of photo response non-uniformity noise (PRNU), a unique fingerprint of imaging sensors, in various digital forensic applications such as source device identification, content integrity verification and authentication.
Li, Chang-Tsun, Li, Yue
core +2 more sources
Millimeter wave (mm-wave) communications, especially mm-wave relay systems, have been considered as a key technology for next-generation wireless networks due to the rich spectrum resources.
Shaoyu Wang +5 more
doaj +1 more source
Artificial Noise Aided Secure Transmission for Active RIS-Aided NOMA Networks
A secrecy rate maximization problem for active reconfigurable intelligent surface (RIS) aided non-orthogonal multiple access networks has been studied in this paper. Assuming that the perfect channel state information is available, we aim to maximize the
Fengming Yang, Weiran Guo, Jianxin Dai
doaj +1 more source
Ultimate on-chip quantum amplifier [PDF]
We report amplification of electromagnetic waves by a single artificial atom in open 1D space. Our three-level artificial atom -- a superconducting quantum circuit -- coupled to a transmission line presents an analog of a natural atom in open space.
A. A. Abdumalikov +7 more
core +2 more sources
Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication system [PDF]
In this paper we determine the noise properties needed for unconditional security for the ideal Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system using simple statistical analysis.
Gingl, Zoltan, Mingesz, Robert
core +3 more sources

