Results 11 to 20 of about 8,284 (186)

New Results on Multiple-Input Multiple-Output Broadcast Channels with Confidential Messages [PDF]

open access: yes, 2011
This paper presents two new results on multiple-input multiple-output (MIMO) Gaussian broadcast channels with confidential messages. First, the problem of the MIMO Gaussian wiretap channel is revisited.
Liu, Ruoheng   +3 more
core   +1 more source

Capacity-equivocation region of a special case of wiretap channel with noiseless feedback

open access: yesJournal of Communications and Networks, 2015
The general wiretap channel with noiseless feedback is first investigated by Ahlswede and Cai, where lower and upper bounds on the secrecy capacity are provided in their work. The upper bound is met with equality only in some special cases. In this paper, we study a special case of the general wiretap channel with noiseless feedback (called non ...
Dai, Bin   +3 more
openaire   +1 more source

On Secure Transmission over Parallel Relay Eavesdropper Channel [PDF]

open access: yes, 2010
We study a four terminal parallel relay-eavesdropper channel which consists of multiple independent relay-eavesdropper channels as subchannels. For the discrete memoryless case, we establish inner and outer bounds on the rate-equivocation region.
Awan, Zohaib Hassan   +2 more
core   +3 more sources

Source-Channel Secrecy with Causal Disclosure [PDF]

open access: yes, 2012
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined.
Cuff, Paul   +3 more
core   +1 more source

Secure Lossy Source Coding with Side Information at the Decoders [PDF]

open access: yes, 2010
This paper investigates the problem of secure lossy source coding in the presence of an eavesdropper with arbitrary correlated side informations at the legitimate decoder (referred to as Bob) and the eavesdropper (referred to as Eve).
Piantanida, Pablo, Villard, Joffrey
core   +2 more sources

Improved Rate-Equivocation Regions for Secure Cooperative Communication

open access: yes, 2011
A simple four node network in which cooperation improves the information-theoretic secrecy is studied. The channel consists of two senders, a receiver, and an eavesdropper.
Marina, Ninoslav   +2 more
core   +1 more source

Performance Analysis and Design of Two Edge Type LDPC Codes for the BEC Wiretap Channel

open access: yes, 2011
We consider transmission over a wiretap channel where both the main channel and the wiretapper's channel are Binary Erasure Channels (BEC). We propose a code construction method using two edge type LDPC codes based on the coset encoding scheme.
Andersson, Mattias   +4 more
core   +1 more source

The MIMO wiretap channel [PDF]

open access: yes, 2008
We study the MIMO wiretap channel, a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper.
Hassibi, Babak, Oggier, Frédérique
core   +1 more source

On the Construction of Polar Codes for Achieving the Capacity of Marginal Channels

open access: yes, 2017
Achieving security against adversaries with unlimited computational power is of great interest in a communication scenario. Since polar codes are capacity achieving codes with low encoding-decoding complexity and they can approach perfect secrecy rates ...
Aram, Siamak   +3 more
core   +1 more source

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [PDF]

open access: yes, 2018
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.
Caire, Giuseppe   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy